2015
DOI: 10.1007/978-3-319-19321-2_25
|View full text |Cite
|
Sign up to set email alerts
|

Optimal XOR Based (2,n)-Visual Cryptography Schemes

Abstract: A (2, )-Visual Cryptography Scheme (VCS) is a kind of secret sharing scheme, where participants share a secret image, and any two of them can recover the secret image visually without any cryptographic knowledge and computation devices, but any one of them cannot get any information about the secret image other than the size of the secret image. This paper studies the (2, )− , and shows the smallest (optimal) pixel expansion of such schemes, and the largest possible contrast for the (2, ) − given its optimal p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…Hence, their computational complexity is Oð1Þ. Indeed, the computation complexity of the proposed scheme and other XORbased VC schemes [26,28,27] is relatively high as that of the OR-based VC schemes. However, the XOR-based VC schemes can achieve superior visual quality and solve the pixel alignment problem of OR-based VC schemes.…”
Section: Computational Complexitymentioning
confidence: 94%
See 3 more Smart Citations
“…Hence, their computational complexity is Oð1Þ. Indeed, the computation complexity of the proposed scheme and other XORbased VC schemes [26,28,27] is relatively high as that of the OR-based VC schemes. However, the XOR-based VC schemes can achieve superior visual quality and solve the pixel alignment problem of OR-based VC schemes.…”
Section: Computational Complexitymentioning
confidence: 94%
“…Let n be the number of shares, the computation complexity is O(n). Table 3 summarises the comparisons of computational complexity for the decryption among the proposed scheme and other related schemes [26,28,27,21,12,[35][36][37]. As compared to some reported schemes [36,37] based on Shamir's method [38] which involves the polynomial evaluation and interpolation, the computational complexity of the proposed scheme requires less time.…”
Section: Computational Complexitymentioning
confidence: 96%
See 2 more Smart Citations
“…The (2,n) Visual Cryptography technique [1] can also be broken by few of the sharing parties and their shares can be changed in order to create an entirely different secret message.…”
Section: Introductionmentioning
confidence: 99%