Abstract
A drawback of visual cryptography schemes (VCS) is much loss of contrast in the reconstructed image. This paper shows that no loss of contrast can be almost achieved if we are allowed to use a very simple non-cryptographic operation, reversing black and white. Many copy machines have this function these days. Therefore, our VCS is very attractive.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Visual cryptography for general access structures. Information and Computation 129, 86–106 (1996)
Benaloh, J.C., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 27–36. Springer, Heidelberg (1990)
Blundo, C., De. Santis, A.: Visual cryptography schemes with perfect reconstruction of black pixels. Computer and Graphics 22(4), 449–455 (1998)
Blundo, C., De. Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. Journal of Cryptology 12(4), 261–289 (1999)
Blundo, C., D’Arco, P., De. Santis, A., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM Journal on Discrete Mathematics (to appear), Available from http://cacr.math.uwaterloo.ca/~dstinson/papers/COTVCS.ps
Blundo, C., De. Bonis, A., De. Santis, A.: Improved schemes for visual cryptography. Designs, Codes, and Cryptography 24, 255–278 (2001)
Eisen, P.A., Stinson, D.R.: Threshold Visual Cryptography Schemes With Specified Whiteness Levels of Reconstructed Pixels. Designs, Codes, and Cryptography 25(1), 15–61 (2002)
Itoh, M., Saito, A., Nishizeki, T.: Multiple assignment scheme for sharing secret. Journal of Cryptology 6(1), 15–20 (1993)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Naor, M., Shamir, A.: Visual cryptography II: Improving the Contrast Via the Cover Base. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 197–202. Springer, Heidelberg (1997), Full version available from http://www.wisdom.weizmann.ac.il/~naor/PAPERS/new_cov.ps
Verheul, E.R., van Tilborg, H.C.A.: Constructions and properties of k out of n visual secret sharing schemes. Designs, Codes, and Cryptography 11(2), 179–196 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Viet, D.Q., Kurosawa, K. (2004). Almost Ideal Contrast Visual Cryptography with Reversing. In: Okamoto, T. (eds) Topics in Cryptology – CT-RSA 2004. CT-RSA 2004. Lecture Notes in Computer Science, vol 2964. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24660-2_27
Download citation
DOI: https://doi.org/10.1007/978-3-540-24660-2_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20996-6
Online ISBN: 978-3-540-24660-2
eBook Packages: Springer Book Archive