Advertisement

On the Extensions of (k, n)*-Visual Cryptographic Schemes

  • Kanakkath Praveen
  • K. Rajeev
  • M. Sethumadhavan
Part of the Communications in Computer and Information Science book series (CCIS, volume 420)

Abstract

A deterministic (k, n)*-Visual cryptographic scheme (VCS) was proposed by Arumugam et.al [1] in 2012. Probabilistic schemes are used in visual cryptography to reduce the pixel expansion. In this paper, we have shown that the contrast of probabilistic (k, n)*-VCS is same as that of deterministic (k, n)*- VCS. This paper also proposes a construction of (k, n)*-VCS with multiple essential participants. It is shown that in both deterministic and probabilistic cases the contrast of the (k, n)*-VCS with multiple essential participant is same as that of (k, n)*-VCS.

Keywords

Visual Cryptography Deterministic schemes Probabilistic schemes 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Arumugam, S., Lakshmanan, R., Nagar, A.K.: On (k, n)*-Visual Cryptography Scheme. Designs, Codes and Cryptography (2012), doi:10.1007/s10623-012-9722-2Google Scholar
  2. 2.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structures. Information and Computation 129(2), 86–106 (1996)CrossRefzbMATHMathSciNetGoogle Scholar
  3. 3.
    Blundo, C., Bonis, A.D., De Santis, A.: Improved schemes for visual cryptography. Designs, Codes and Cryptography 24(3), 255–278 (2001)CrossRefzbMATHMathSciNetGoogle Scholar
  4. 4.
    Droste, S.: New Results on Visual Cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401–415. Springer, Heidelberg (1996)Google Scholar
  5. 5.
    Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundamentals E82-A(10), 2172–2177 (1999)Google Scholar
  6. 6.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  7. 7.
    Tuyls, P., Hollmann, H.D.L., Lint, J.H.V., Tolhuizen, L.: XOR-based visual cryptography schemes. Designs, Codes and Cryptography 37(1), 169–186 (2005)CrossRefzbMATHMathSciNetGoogle Scholar
  8. 8.
    Wu, X., Wei, S.: Visual secret sharing for general access structures by random grids. Information Security, IET 4(6), 299–309 (2012)CrossRefGoogle Scholar
  9. 9.
    Yang, C.N.: New Visual Secret Sharing Schemes Using Probabilistic Method. Pattern Recognition Letters 25(4), 481–494 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Kanakkath Praveen
    • 1
  • K. Rajeev
    • 1
  • M. Sethumadhavan
    • 1
  1. 1.TIFAC CORE in Cyber SecurityAmrita Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations