Abstract
In the literature a lot of studies were carried out on (2, n) visual cryptographic scheme (VCS) using either XOR or OR operation. A scheme on ideal contrast (2, n) VCS with reversing using combined OR and NOT operations was reported. In this paper, a construction on an ideal contrast (2, n) VCS using combined XOR and OR operations with less amount of transparencies than ideal contrast (2, n) VCS with reversing using OR and NOT operations is proposed. This paper also shows a construction of (2, n) VCS with pixel expansion one which perfectly reconstruct the white pixels and probabilistically reconstruct the black pixel using XOR operation.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Visual Cryptography for general access structures. Information and Computation 129, 86–106 (1996)
Droste, S.: New results on visual cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401–415. Springer, Heidelberg (1996)
Adhikari, A., Dutta, T.K., Roy, B.: A New Black and White Visual cryptographic scheme for general access structures. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 399–413. Springer, Heidelberg (2004)
Tylus, P., Hollman, H.D.L., Lint, J.H.V., Tolhuizen, L.: XOR based visual cryptographic schemes. Design Codes and Cryptography 37(1), 169–186 (2005)
Yang, C.N.: New Visual secret sharing scheme using probabilistic method. Pattern Recognition Letters 25(4), 481–494 (2004)
Bose, M., Mukerjee, R.: Optimal (2, n) Visual Cryptographic scheme. Design Codes and Cryptography 40(3), 255–267 (2006)
Sreekumar, A., Babusundar, S.: Uniform secret sharing scheme for (2, n) threshold using Visual Cryptography. International Journal of Information Processing 2(4) (2008)
Feng, L., Wu, C.K.: Optimal XOR based (2, n) Visual Cryptographic scheme. IACR Cryptology eprint Archives (2010)
Cimato, S., Santis, A.D., Ferrara, A.L., Masucci, B.: Ideal contrast Visual Cryptographic scheme with reversing. Information Processing Letters 93, 199–206 (2005)
Blundo, C., Bonis, A.D., Santis, A.D.: Improved schemes for Visual Cryptography. Design Codes and Cryptography 24, 255–278 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Praveen, K., Sethumadhavan, M. (2014). Results on (2, n) Visual Cryptographic Scheme. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44966-0_32
Download citation
DOI: https://doi.org/10.1007/978-3-662-44966-0_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44965-3
Online ISBN: 978-3-662-44966-0
eBook Packages: Computer ScienceComputer Science (R0)