LI Shundong, LI Jiliang, WANG Daoshun. Region Incrementing Visual Cryptography Scheme with Same Contrast[J]. Chinese Journal of Electronics, 2016, 25(4): 621-624. doi: 10.1049/cje.2016.06.002
Citation: LI Shundong, LI Jiliang, WANG Daoshun. Region Incrementing Visual Cryptography Scheme with Same Contrast[J]. Chinese Journal of Electronics, 2016, 25(4): 621-624. doi: 10.1049/cje.2016.06.002

Region Incrementing Visual Cryptography Scheme with Same Contrast

doi: 10.1049/cje.2016.06.002
Funds:  This work is supported by the National Natural Science Foundation of China (No.61070189, No.61272435, No.61170032, No.61373020).
  • Received Date: 2014-06-03
  • Rev Recd Date: 2014-08-31
  • Publish Date: 2016-07-10
  • In binary Region incrementing visual cryptography schemes (RIVCSs), the secrets of multiple secrecy regions can be gradually revealed by human visual system. A characteristic of the existing binary RIVCSs different from traditional binary Visual cryptography schemes (VCSs) is that, the contrasts for different revealed regions are different while traditional binary VCSs have same contrast. To keep the quality (contrast) of recovered image compatible with the traditional VCS, we use integer linear programming to design a binary (k,n)-RIVCS with same contrast for all secrecy regions in this paper. Experimental results demonstrate that our method is feasible and effective. The trade-off is that our scheme involves a larger pixel expansion.
  • loading
  • M. Naor and A. Shamir, "Visual cryptography", Proc. of Advances in Cryptology-EUROCRYPT'94, Springer Berlin Heidelberg, pp.1-12, 1995.
    S. Droste, "New results on visual cryptography", Proc. of Advances in Cryptology-CRYPTO'96, Springer Berlin Heidelberg, pp.401-415, 1996.
    C. Blundo, A. De Santis and D.R. Stinson, "On the contrast in visual cryptography schemes", Journal of Cryptology, Vol.12, No.4, pp.261-289, 1999.
    R.Z. Wang, "Region incrementing visual cryptography", IEEE Signal Processing Letters, Vol.16, No.8, pp.659-662, 2009.
    D.S. Wang, T. Song, L. Dong, et al., "Optimal contrast greyscale visual cryptography schemes with reversing", IEEE Transactions on Information Forensics and Security, Vol.8, No.12, pp.2059-2072, 2013.
    D.S. Wang, L. Dong and X.B. Li, "Towards shift tolerant visual secret sharing schemes", IEEE Transactions on Information Forensics and Security, Vol.6, No.2, pp.323-337, 2011.
    R.Z. Wang, Y.C. Lan, Y.K. Lee, et al., "Incrementing visual cryptography using random grids", Optics Communications, Vol.283, No.21, pp.4242-4249, 2010.
    C.N. Yang, C.C. Wu and D.S. Wang, "A discussion on the relationship between probabilistic visual cryptography and random grid", Information Sciences, Vol.278, pp.141-173, 2014.
    C.N. Yang, H.W. Shih, Y.Y. Chu, et al., "New region incrementing visual cryptography scheme", Proc. of the 2011 International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV 2011) in Conjunction with WORLDCOMP, pp.323-329, 2011.
    C.N. Yang, H.W. Shih, C.C. Wu, et al., "k out of n region incrementing scheme in visual cryptography", IEEE Transactions on Circuits and Systems for Video Technology, Vol.22, No.5, pp.799-810, 2012.
    S.J. Shyu and H.W. Jiang, "Efficient construction for contrast visual cryptography", IEEE Transactions on Circuits and Systems for Video Technology, Vol.22, No.5, pp.769-777, 2012.
    E.R. Verheul and H.C.A. Van Tilborg, "Constructions and properties of k out of n visual secret sharing schemes", Designs, Codes and Cryptography, Vol.11, No.2, pp.179-196, 1997.
    T. Katoh and H. Imai, "An extended construction method for visual secret sharing scheme", Electronics and Communications in Japan (Part III:Fundamental Electronic Science), Vol.81, No.7, pp.55-63, 1998.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (158) PDF downloads(605) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return