Abstract
Recently, Viet and Kurosawa proposed a VCS with reversing, which is a Visual Cryptography Scheme(VCS) where every participant is allowed to change black pixels on the transparency to white pixels and vice-versa. The contrast of their scheme is almost ideal, depending on the number of the reconstruction runs performed. Before long, S. Cimato et al. proposed two VCSs with reversing where the contrast of the reconstructed secret image is ideal. However, both Cimato et al.’s schemes cannot be decrypted solely with the human eye.
In this paper we propose a new ideal VCS with reversing which is compatible and requires less stacking and reversing operations compared to all previous schemes. Each participant is required to store only two transparencies to reconstruct the ideal contrast secret image.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structures. Information and Computation 129(2), 86–106 (1996)
Blundo, C., De Santis, A.: Visual Cryptography Schemes with Perfect Reconstructions of Black Pixels. Journal for Computers Graphics 22(4), 449–455 (1998)
Blundo, C., De Santis, A., Stinson, D.R.: On the Contrast in Visual Cryptography Schemes. Journal of Cryptology 12(4), 261–289 (1999)
Blundo, C., D’Arco, P., De Santis, A., Stinson, D.R.: Contrast Optimal Threshold Visual Cryptography Schemes. SIAM Journal on Discrete Mathematics 16(2), 224–261 (2003)
Cimato, S., De Santis, A., Ferrara, A.L., Masucci, B.: Ideal Contrast Visual Cryptography Schemes with Reversing. Information Process Letters 93(4), 199–206 (2005)
De Bonis, A., De Santis, A.: Randomness in Secret Sharing and Visual Cryptography Schemes. Theoretical Computer Science 314(3), 351–374 (2004)
Droste, S.: New Results on Visual Cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401–415. Springer, Heidelberg (1996)
Eisen, P.A., Stinson, D.R.: Threshold Visual Cryptography with Specified Whiteness Levels of Reconstructed Pixels. Designs, Code, and Cryptography 25(1), 15–61 (2002)
Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n Secret Sharing Schemes in Visual Cryptography. Theoretical Computer Science 240(2), 471–485 (2000)
Krause, M., Simon, H.: Determining the Optimal Contrast for Secret Sharing Schemes in Visual Cryptography. Combinatorics, Probability and Computing 12(3), 285–299 (2003)
Ito, R., Kuwakado, H., Tanaka, H.: Image Size Invariant Visual Cryptography. IEICE Trans. Fundamentals E82-A(10), 481–494 (1999)
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Stinson, D.R.: Visual Cryptography and Threshold Schemes. Dr. Dobb’s Journal (April 1998)
Tzeng, W.G., Hu, C.M.: A New Approach for Visual Cryptography. Designs, Code and Cryptography 27(1), 207–227 (2002)
Verheul, E.R., Van Tilborg, H.C.A.: Constructions and Properties of k out of n Visual Secret Sharing Schemes. Designs, Codes and Cryptography 11(2), 179–196 (1997)
Viet, D.Q., Kurosawa, K.: Almost Ideal Contrast Visual Cryptography with Reversing. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 353–365. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hu, CM., Tzeng, WG. (2005). Compatible Ideal Contrast Visual Cryptography Schemes with Reversing. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds) Information Security. ISC 2005. Lecture Notes in Computer Science, vol 3650. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11556992_22
Download citation
DOI: https://doi.org/10.1007/11556992_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29001-8
Online ISBN: 978-3-540-31930-6
eBook Packages: Computer ScienceComputer Science (R0)