Abstract
In visual cryptography schemes (VCS), we often denote the set of all parties by \(P=\{1,2,\cdots ,n\}\). Arumugam et al. proposed a \((k,n)\)-VCS with one essential party recently, in which only subset \(S\) of parties satisfying \(S\subseteq P\) and \(|S|\ge k\) and \(1\in S\) can recover the secret. In this paper, we extend Arumugam et al.’s idea and propose a \((k,n)\)-VCS with \(t\) essential parties, say \((k,n,t)\)-VCS for brevity, in which only subset \(S\) of parties satisfying \(S\subseteq P\) and \(|S|\ge k\) and \(\{1,2,\ldots ,t\}\in S\) can recover the secret. Furthermore, some bounds for the optimal pixel expansion and optimal relative contrast of \((k,n,t)\)-VCS are derived.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Droste, S.: New results on visual cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401–415. Springer, Heidelberg (1996)
Verheul, E., Tilborg, H.V.: Constructions and properties of k out of n visual secret sharing schemes. Des. Codes Crypt. 11(2), 179–196 (1997)
Eisen, P.A., Stinson, D.R.: Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. Des. Codes Crypt. 25, 15–61 (2002)
Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theoret. Comput. Sci. 240(2), 471–485 (2000)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996)
Tzeng, W.G., Hu, C.M.: A new approach for visual cryptography. Des. Codes Crypt. 27, 207–227 (2002)
Blundo, C., Cimato, S., De Santis, A.: Visual cryptography schemes with optimal pixel expansion. Theoret. Comput. Sci. 369, 169–182 (2006)
Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Des. Codes Crypt. 50, 215–227 (2009)
Wang, D.S., Dong, L., Li, X.B.: Towards shift tolerant visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 323–337 (2011)
Horng, G.B., Chen, T.H., Tsai, D.S.: Cheating in visual cryptography. Des. Codes Crypt. 38, 219–236 (2006)
Hu, C.M., Tzeng, W.G.: Cheating prevention in visual cryptography. IEEE Trans. Image Process. 16(1), 36–45 (2007)
Chen, Y.C., Horng, G., Tsai, D.S.: Comment on “cheating prevention in visual cryptography”. IEEE Trans. Image Process. 21(7), 3319–3323 (2012)
Wang, R.Z.: Region incrementing visual cryptography. IEEE Signal Process. Lett. 16(8), 659–662 (2009)
Yang, C.N., Shih, H.W., Wu, C.C., Harn, L.: k out of n region incrementing scheme in visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 22(6), 779–810 (2012)
Shyu, S.J.: Efficient construction for region incrementing visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 22(5), 769–777 (2012)
Guo, T., Liu, F., Wu, C.K.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86, 2094–2109 (2013)
Guo, T., Liu, F., Wu, C.K.: k out of k extended visual cryptography scheme by random grids. Sig. Process 94, 90–101 (2014)
Arumugam, S., Lakshmanan, R., Nagar, A.K.: On (k, n)*-visual cryptography scheme. Des. Codes Crypt. (2012). doi:10.1007/s10623-012-9722-2
Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. J. Crypt. 12(4), 261–289 (1999)
Adhikari, A., Dutta, T.K., Roy, B.: A new black and white visual cryptographic scheme for general access structures. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 399–413. Springer, Heidelberg (2004)
Acknowledgments
This work was supported by 863 Program grant No. Y370071102, the “Strategic Priority Research Program” of the Chinese Academy of Sciences grant No. XDA06010701, the IIE’s Projects grant No. Y3Z001B102 and NSFC grant No. 61303256.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Guo, T., Liu, F., Wu, C., Ren, Y., Wang, W. (2014). On \((k, n)\) Visual Cryptography Scheme with \(t\) Essential Parties. In: Padró, C. (eds) Information Theoretic Security. ICITS 2013. Lecture Notes in Computer Science(), vol 8317. Springer, Cham. https://doi.org/10.1007/978-3-319-04268-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-04268-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04267-1
Online ISBN: 978-3-319-04268-8
eBook Packages: Computer ScienceComputer Science (R0)