Skip to main content
Erschienen in: Designs, Codes and Cryptography 1/2016

01.07.2016

Constructions and analysis of some efficient \(t\)-\((k,n)^*\)-visual cryptographic schemes using linear algebraic techniques

verfasst von: Sabyasachi Dutta, Raghvendra Singh Rohit, Avishek Adhikari

Erschienen in: Designs, Codes and Cryptography | Ausgabe 1/2016

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper we put forward an efficient construction, based on linear algebraic technique, of a \(t\)-\((k,n)^*\)-visual cryptographic scheme (VCS) for monochrome images in which \(t\) participants are essential in a \((k,n)\)-VCS. The scheme is efficient in the sense that it only requires solving a system of linear equations to construct the required initial basis matrices. To make the scheme more efficient, we apply the technique of deletion of common columns from the initial basis matrices to obtain the reduced basis matrices. However finding exact number of common columns in the initial basis matrices is a challenging problem. In this paper we deal with this problem. We first provide a construction and analysis of \(t\)-\((k,n)^*\)-VCS. We completely characterize the case of \(t\)-\((n-1,n)^*\)-VCS, \(0 \le t \le n-1\), by finding a closed form of the exact number of common columns in the initial basis matrices and thereby deleting the common columns to get the exact value of the reduced pixel expansion and relative contrast of the efficient and simple scheme. Our proposed closed form for reduced pixel expansion of \((n-1,n)\)-VCS matches with the numerical values of the optimal pixel expansions for every possible values of \(n\) that exist in the literature. We further deal with the \((n-2,n)\)-VCS and resolve an open issue by providing an efficient algorithm for grouping the system of linear equations and thereby show that our proposed algorithm works better than the existing scheme based on the linear algebraic technique. Finally we provide a bound for reduced pixel expansion for \((n-2,n)\)-VCS and numerical evidence shows it achieves almost optimal pixel expansion.
Literatur
1.
Zurück zum Zitat Adhikari A.: Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images. Des. Codes Cryptogr. 73(3), 865–895 (2014). Adhikari A.: Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images. Des. Codes Cryptogr. 73(3), 865–895 (2014).
2.
Zurück zum Zitat Adhikari A., Bose M.: A new visual cryptographic scheme using latin squares. IEICE Trans. Fundam. E87-A(5), 1998–2002 (2004). Adhikari A., Bose M.: A new visual cryptographic scheme using latin squares. IEICE Trans. Fundam. E87-A(5), 1998–2002 (2004).
3.
Zurück zum Zitat Adhikari A., Sikdar S.: A new \((2, n)\)-color visual threshold scheme for color images. In: INDOCRYPT’03, Lecture Notes in Computer Science, vol. 2904, pp. 148–161. Springer, Berlin (2003). Adhikari A., Sikdar S.: A new \((2, n)\)-color visual threshold scheme for color images. In: INDOCRYPT’03, Lecture Notes in Computer Science, vol. 2904, pp. 148–161. Springer, Berlin (2003).
4.
Zurück zum Zitat Adhikari A., Dutta T.K., Roy B.: A new black and white visual cryptographic scheme for general access structures. In: INDOCRYPT’04, Lecture Notes in Computer Science, vol. 3348, pp. 399–413. Springer, Berlin (2004). Adhikari A., Dutta T.K., Roy B.: A new black and white visual cryptographic scheme for general access structures. In: INDOCRYPT’04, Lecture Notes in Computer Science, vol. 3348, pp. 399–413. Springer, Berlin (2004).
5.
Zurück zum Zitat Adhikari A., Kumar D, Bose M., Roy B.: Applications of partially balanced and balanced incomplete block designs in developing visual cryptographic schemes. IEICE Trans. Fundam. Jpn. E-90A(5), 949–951 (2007). Adhikari A., Kumar D, Bose M., Roy B.: Applications of partially balanced and balanced incomplete block designs in developing visual cryptographic schemes. IEICE Trans. Fundam. Jpn. E-90A(5), 949–951 (2007).
6.
Zurück zum Zitat Arumugam S., Lakshmanan R., Nagar A.K.: On (k, n)*-visual cryptography scheme. Des. Codes Cryptogr. 71(1), 153–162 (2014). Arumugam S., Lakshmanan R., Nagar A.K.: On (k, n)*-visual cryptography scheme. Des. Codes Cryptogr. 71(1), 153–162 (2014).
7.
Zurück zum Zitat Ateniese G., Blundo C., De Santis A., Stinson D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996). Ateniese G., Blundo C., De Santis A., Stinson D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996).
8.
Zurück zum Zitat Ateniese G., Blundo C., De Santis A., and Stinson D.R.: Constructions and bounds for visual cryptography. In: 23rd International Colloquium on Automata, Languages and Programming (ICALP ’96). Lecture Notes in Computer Science, vol. 1099, pp. 416–428. Springer, Berlin (1996). Ateniese G., Blundo C., De Santis A., and Stinson D.R.: Constructions and bounds for visual cryptography. In: 23rd International Colloquium on Automata, Languages and Programming (ICALP ’96). Lecture Notes in Computer Science, vol. 1099, pp. 416–428. Springer, Berlin (1996).
9.
Zurück zum Zitat Blundo C., De Santis A.: Visual cryptography schemes with perfect reconstruction of black pixels. Comput. Graph. 22, 449–455 (1998). Blundo C., De Santis A.: Visual cryptography schemes with perfect reconstruction of black pixels. Comput. Graph. 22, 449–455 (1998).
10.
Zurück zum Zitat Blundo C., De Santis A., Stinson D.R.: On the contrast in visual cryptography schemes. J. Cryptol. 12(4), 261–289 (1999). Blundo C., De Santis A., Stinson D.R.: On the contrast in visual cryptography schemes. J. Cryptol. 12(4), 261–289 (1999).
11.
Zurück zum Zitat Blundo C., Bonis A.D., Santis A.D.: Improved schemes for visual cryptography. Des. Codes Cryptogr. 24, 255–278 (2001). Blundo C., Bonis A.D., Santis A.D.: Improved schemes for visual cryptography. Des. Codes Cryptogr. 24, 255–278 (2001).
12.
Zurück zum Zitat Blundo C., D’arco P., De Santis A., Stinson D.R.: Contrast optimal threshold visual cryptography. SIAM J. Discret. Math. 16(2), 224–261 (2003). Blundo C., D’arco P., De Santis A., Stinson D.R.: Contrast optimal threshold visual cryptography. SIAM J. Discret. Math. 16(2), 224–261 (2003).
13.
Zurück zum Zitat Bose M., Mukerjee R.: Optimal \((k, n)\) visual cryptographic schemes for general \(k\). Des. Codes Cryptogr. 55(1), 19–35 (2010). Bose M., Mukerjee R.: Optimal \((k, n)\) visual cryptographic schemes for general \(k\). Des. Codes Cryptogr. 55(1), 19–35 (2010).
14.
Zurück zum Zitat Guo T., Liu F., Wu C., Ren Y.W., Wang W.: On (k, n) visual cryptography scheme with \(t\) essential parties. In: ICITS 2013. Lecture Notes in Computer Science, pp. 56–68. Springer, Berlin (2013). Guo T., Liu F., Wu C., Ren Y.W., Wang W.: On (k, n) visual cryptography scheme with \(t\) essential parties. In: ICITS 2013. Lecture Notes in Computer Science, pp. 56–68. Springer, Berlin (2013).
15.
Zurück zum Zitat Cimato S., Prisco R.D., Santis A.D.: Optimal colored threshold cisual cryptography schemes. Des. Codes Cryptogr. 35, 311–335 (2005). Cimato S., Prisco R.D., Santis A.D.: Optimal colored threshold cisual cryptography schemes. Des. Codes Cryptogr. 35, 311–335 (2005).
16.
Zurück zum Zitat Cimato S., De Prisco R., De Santis A.: Colored visual cryptography without color darkening. Theor. Comput. Sci. 374(1–3), 261–276 (2007). Cimato S., De Prisco R., De Santis A.: Colored visual cryptography without color darkening. Theor. Comput. Sci. 374(1–3), 261–276 (2007).
17.
Zurück zum Zitat Droste S.: New results on visual cryptography, advance in cryptography. In: CRYPTO’96. Lecture Notes in Computer Science, vol. 1109, pp. 401–415. Springer, Berlin (1996). Droste S.: New results on visual cryptography, advance in cryptography. In: CRYPTO’96. Lecture Notes in Computer Science, vol. 1109, pp. 401–415. Springer, Berlin (1996).
18.
Zurück zum Zitat Ishihara T., Koga H.: New constructions of the lattice-based visual secret sharing using mixture of colors. IEICE Trans. Fundam. E85-A(1), 158–166 (2002). Ishihara T., Koga H.: New constructions of the lattice-based visual secret sharing using mixture of colors. IEICE Trans. Fundam. E85-A(1), 158–166 (2002).
19.
Zurück zum Zitat Koga H.: A general formula of the \((t, n)\)-threshold visual secret sharing scheme. In: ASIACRYPT 2002. Lecture Notes in Computer Science, vol. 2501, pp. 328–345. Springer, Berlin (2002). Koga H.: A general formula of the \((t, n)\)-threshold visual secret sharing scheme. In: ASIACRYPT 2002. Lecture Notes in Computer Science, vol. 2501, pp. 328–345. Springer, Berlin (2002).
20.
Zurück zum Zitat Naor M., Shamir A.: Visual cryptography, advance in cryptography. In: EUROCRYPT’94. Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer, Berlin (1994). Naor M., Shamir A.: Visual cryptography, advance in cryptography. In: EUROCRYPT’94. Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer, Berlin (1994).
21.
Zurück zum Zitat Shyu S.J.: Image encryption by random grids. Pattern Recognit. 40(3), 1014–1031 (2007). Shyu S.J.: Image encryption by random grids. Pattern Recognit. 40(3), 1014–1031 (2007).
22.
Zurück zum Zitat Shyu S.J.: Image encryption by multiple random grids. Pattern Recognit. 42(7), 1582–1596 (2009). Shyu S.J.: Image encryption by multiple random grids. Pattern Recognit. 42(7), 1582–1596 (2009).
23.
Zurück zum Zitat Shyu S.J., Chen M.C.: Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 6(3), pt. 2, 960–969 (2011). Shyu S.J., Chen M.C.: Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 6(3), pt. 2, 960–969 (2011).
24.
Zurück zum Zitat Verheul E.R., Tilborg V.H.C.A.: Constructions and properties of \(k\) out of \(n\) visual secret sharing schemes. Des. Codes Cryptogr. 11, 179–196 (1997). Verheul E.R., Tilborg V.H.C.A.: Constructions and properties of \(k\) out of \(n\) visual secret sharing schemes. Des. Codes Cryptogr. 11, 179–196 (1997).
25.
Zurück zum Zitat Wang D.S., Yi F., Li X.: On general construction for extended visual cryptography schemes. Pattern Recognit. 42(11), 3071–3082 (2009). Wang D.S., Yi F., Li X.: On general construction for extended visual cryptography schemes. Pattern Recognit. 42(11), 3071–3082 (2009).
Metadaten
Titel
Constructions and analysis of some efficient --visual cryptographic schemes using linear algebraic techniques
verfasst von
Sabyasachi Dutta
Raghvendra Singh Rohit
Avishek Adhikari
Publikationsdatum
01.07.2016
Verlag
Springer US
Erschienen in
Designs, Codes and Cryptography / Ausgabe 1/2016
Print ISSN: 0925-1022
Elektronische ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-015-0075-5

Weitere Artikel der Ausgabe 1/2016

Designs, Codes and Cryptography 1/2016 Zur Ausgabe