On the Extensions of (k, n)*-Visual Cryptographic Schemes

  • Kanakkath Praveen
  • K. Rajeev
  • M. Sethumadhavan
Part of the Communications in Computer and Information Science book series (CCIS, volume 420)


A deterministic (k, n)*-Visual cryptographic scheme (VCS) was proposed by Arumugam [1] in 2012. Probabilistic schemes are used in visual cryptography to reduce the pixel expansion. In this paper, we have shown that the contrast of probabilistic (k, n)*-VCS is same as that of deterministic (k, n)*- VCS. This paper also proposes a construction of (k, n)*-VCS with multiple essential participants. It is shown that in both deterministic and probabilistic cases the contrast of the (k, n)*-VCS with multiple essential participant is same as that of (k, n)*-VCS.


Visual Cryptography Deterministic schemes Probabilistic schemes 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Arumugam, S., Lakshmanan, R., Nagar, A.K.: On (k, n)*-Visual Cryptography Scheme. Designs, Codes and Cryptography (2012), doi:10.1007/s10623-012-9722-2Google Scholar
  2. 2.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structures. Information and Computation 129(2), 86–106 (1996)CrossRefzbMATHMathSciNetGoogle Scholar
  3. 3.
    Blundo, C., Bonis, A.D., De Santis, A.: Improved schemes for visual cryptography. Designs, Codes and Cryptography 24(3), 255–278 (2001)CrossRefzbMATHMathSciNetGoogle Scholar
  4. 4.
    Droste, S.: New Results on Visual Cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401–415. Springer, Heidelberg (1996)Google Scholar
  5. 5.
    Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundamentals E82-A(10), 2172–2177 (1999)Google Scholar
  6. 6.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  7. 7.
    Tuyls, P., Hollmann, H.D.L., Lint, J.H.V., Tolhuizen, L.: XOR-based visual cryptography schemes. Designs, Codes and Cryptography 37(1), 169–186 (2005)CrossRefzbMATHMathSciNetGoogle Scholar
  8. 8.
    Wu, X., Wei, S.: Visual secret sharing for general access structures by random grids. Information Security, IET 4(6), 299–309 (2012)CrossRefGoogle Scholar
  9. 9.
    Yang, C.N.: New Visual Secret Sharing Schemes Using Probabilistic Method. Pattern Recognition Letters 25(4), 481–494 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Kanakkath Praveen
    • 1
  • K. Rajeev
    • 1
  • M. Sethumadhavan
    • 1
  1. 1.TIFAC CORE in Cyber SecurityAmrita Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations