Visual cryptography for general access structures
Information and Computation
A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Determining the Optimal Contrast for Secret Sharing Schemes in Visual Cryptography
Combinatorics, Probability and Computing
New visual secret sharing schemes using probabilistic method
Pattern Recognition Letters
XOR-based Visual Cryptography Schemes
Designs, Codes and Cryptography
Optimal colored threshold visual cryptography schemes
Designs, Codes and Cryptography
Probabilistic Visual Cryptography Schemes
The Computer Journal
Size-Adjustable Visual Secret Sharing Schemes
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Improvements of a two-in-one image secret sharing scheme based on gray mixing model
Journal of Visual Communication and Image Representation
On the equivalence of two definitions of visual cryptography scheme
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Flexible visual cryptography scheme without distortion
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Improving the visual quality of random grid-based visual secret sharing
Signal Processing
On the security of multi-secret visual cryptography scheme with ring shares
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Secret sharing with multi-cover adaptive steganography
Information Sciences: an International Journal
Improved tagged visual cryptography by random grids
Signal Processing
Hi-index | 0.00 |
Two common drawbacks of the visual cryptography scheme (VCS) are the large pixel expansion of each share image and the small contrast of the recovered secret image. In this paper, we propose a step construction to construct VCSOR and VCSXOR for general access structure by applying (2,2)-VCS recursively, where a participant may receive multiple share images. The proposed step construction generates VCSOR and VCSXOR which have optimal pixel expansion and contrast for each qualified set in the general access structure in most cases. Our scheme applies a technique to simplify the access structure, which can reduce the average pixel expansion (APE) in most cases compared with many of the results in the literature. Finally, we give some experimental results and comparisons to show the effectiveness of the proposed scheme.