Advanced Search
Volume 32 Issue 4
Dec.  2010
Turn off MathJax
Article Contents
Fu Zheng-xin, Yu Bin, Fang Li-guo. The Multi-secret Visual Cryptography Based on Ring Shares[J]. Journal of Electronics & Information Technology, 2010, 32(4): 880-883. doi: 10.3724/SP.J.1146.2009.00410
Citation: Fu Zheng-xin, Yu Bin, Fang Li-guo. The Multi-secret Visual Cryptography Based on Ring Shares[J]. Journal of Electronics & Information Technology, 2010, 32(4): 880-883. doi: 10.3724/SP.J.1146.2009.00410

The Multi-secret Visual Cryptography Based on Ring Shares

doi: 10.3724/SP.J.1146.2009.00410
  • Received Date: 2009-03-26
  • Rev Recd Date: 2009-09-21
  • Publish Date: 2010-04-19
  • Based on the correlative matrices, which are designed by dividing secret images and shares into vertical areas, a new multi-secret visual cryptography scheme is presented in this paper. Compared to the previous ones, the proposed scheme makes the number of secret images not restricted and has obviously improved the pixel expansion and the relative difference.
  • loading
  • Blakley G R. Safeguarding cryptographic keys[C].Proceedings of the National Computer Conference, NJ, USA,1979, 48: 242-268.[2]Shamir A. How to share a secret[J]. Communications of theACM, 1979, 22(11): 612-613.[3]Naor M and Shamir A. Visual cryptography[C][J].Advances inCryptology-Eurocrypt94, Berlin.1995, LNCS 950:1-12[4]Ateniese G, Blundo C, De Santis A, and Stinson D R. Visualcryptography for general access structures[J].Informationand Computation.1996, 129(2):86-106[5]Tuyls P, Hollmann H D L, Lint J H V, and Tolhuizen L.XOR-based visual cryptography schemes[J].Designs, Codesand Cryptography.2005, 37(1):169-186[6]Fang Li-guo and Yu Bin. Research on pixel expansion of (2, n)visual threshold scheme[C]. 1st International Symposium onPervasive Computing and Applications Proceedings(SPCA06), Ningbo, 2006: 856-860.[7]Lin Sen-jen, Lin Ja-chen, and Fang Wen-pinn. VisualCryptography (VC) with non-expanded shadow imagesHilbert-curve approach[C]. ISI2008, Taipei, 2008: 271-272.[8]Yang Ching-nung, Wang Chung-chun, and Chen Tse-shih.Visual cryptography schemes with reversing[J]. TheComputer Journal, 2008, bxm118: 1-13.[9]Lin Chang-chou and Tai Wen-hsiang. Visual cryptographyfor gray-level images by dithering techniques[J]. PatternRecognition Letters, 2003, 24(1-3): 349-358.[10]Cimato S, De Prisco R, and De Santis A. Optimal coloredthreshold visual cryptography schemes[J].Designs, Codesand Cryptography.2005, 35(3):311-335[11]Yang Ching-nung and Chen Tse-shih. Colored visualcryptography scheme based on additive color mixing[J].Pattern Recognition.2008, 41(10):3114-3129[12]Ng F Y and Wong D S. On the security of a visualcryptography scheme for color images[J].Pattern Recognition.2009, 42(5):929-940[13]Yu Bin, Xu Xiao-hui, and Fang Li-guo. Multi-secret sharingthreshold visual cryptography scheme[C]. 2007 InternationalConference on Computational Intelligence and Security(CIS2007), Harbin, 2007: 815-818.[14]Chen L H and Wu C C. A study on visual cryptography[D].[Master Thesis], National Chiao Tung University, Taiwan,1998.[15]Hsu H C.[J].Chen T S, and Lin Y H. The ring shadow imagetechnology of visual cryptography by applying diverserotating angles to hide the secret sharing[C]. Proceedings ofthe 2004 IEEE International Conference on Networking,Sensing Control, Taipei, Taiwan.2004,:-[16]Feng Jen-bang, Wub Hsien-chu, and Tsaic Chwei-shyong, etal.. Visual secret sharing for multiple secrets[J]. PatternRecognition, 2008, 41(12): 3572-3581.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3387) PDF downloads(840) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return