Open Access   Article Go Back

Construction of Basis Matrices for (k, n) and Progressive Visual Cryptography Schemes

S.B. Bhagate1 , P.J. Kulkarni2

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-01 , Page no. 43-47, Feb-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6si1.4347

Online published on Feb 28, 2018

Copyright © S.B. Bhagate, P.J. Kulkarni . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.B. Bhagate, P.J. Kulkarni, “Construction of Basis Matrices for (k, n) and Progressive Visual Cryptography Schemes,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.01, pp.43-47, 2018.

MLA Style Citation: S.B. Bhagate, P.J. Kulkarni "Construction of Basis Matrices for (k, n) and Progressive Visual Cryptography Schemes." International Journal of Computer Sciences and Engineering 06.01 (2018): 43-47.

APA Style Citation: S.B. Bhagate, P.J. Kulkarni, (2018). Construction of Basis Matrices for (k, n) and Progressive Visual Cryptography Schemes. International Journal of Computer Sciences and Engineering, 06(01), 43-47.

BibTex Style Citation:
@article{Bhagate_2018,
author = {S.B. Bhagate, P.J. Kulkarni},
title = {Construction of Basis Matrices for (k, n) and Progressive Visual Cryptography Schemes},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2018},
volume = {06},
Issue = {01},
month = {2},
year = {2018},
issn = {2347-2693},
pages = {43-47},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=189},
doi = {https://doi.org/10.26438/ijcse/v6i1.4347}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.4347}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=189
TI - Construction of Basis Matrices for (k, n) and Progressive Visual Cryptography Schemes
T2 - International Journal of Computer Sciences and Engineering
AU - S.B. Bhagate, P.J. Kulkarni
PY - 2018
DA - 2018/02/28
PB - IJCSE, Indore, INDIA
SP - 43-47
IS - 01
VL - 06
SN - 2347-2693
ER -

           

Abstract

Security of digital information plays important role to keep the integrity of original media. A secret is something which is kept away from the knowledge of any but those who are privileged to access it. Secret sharing scheme provides a mechanism for sharing secrets among different users securely, where each user receives his part of encoded secret information called as a share. Sufficient number of shares need to be combined together to reconstruct secret information. Text, images, audio and video can be used for sharing secret information in secret sharing scheme. Secret sharing scheme in which secret information is encoded in form of concealed images is called as Visual Cryptography. There are various Visual Cryptography Schemes. Visual Cryptography Scheme’s functionality is dependent on their basis matrices. Constructions of basis matrices for various OR-based and XOR-based Visual Cryptography Schemes are elaborated in this paper.

Key-Words / Index Term

Secret sharing scheme, Visual Cryptography, Data hiding

References

[1] Shamir, A. 1979. How to Share a Secret. Communications of the ACM. 22: 612-613.
[2] Blakely, G. R. 1979. Safeguarding Cryptographic Keys. Proceedings of the National Computer Conference, American Federation of Information Processing Societies Proceedings. 48: 313-317.
[3] Moni Naor and Adi Shamir, “Visual cryptography”. In Proceedings of Advances in Cryptology, EUROCRYPT 94, Lecture Notes in Computer Science, 1995, (950):pp. 1-12.
[4] S. J. Shyu, S. Y. Huanga,Y. K. Lee, R. Z. Wang, andK. Chen, “Sharing multiple secrets in visual cryptography”, Pattern Recognition, Vol. 40, Issue 12, pp. 3633 - 3651, 2007.
[5] Nakajima, M. and Yamaguchi, Y., “Extended visual cryptography for natural images” Journal of WSCG. v10 i2. 303-310.
[6] Jin, W. Q. Yan, and M. S. Kankanhalli, “Progressive color visual cryptography,” J. Electron. Imag., vol. 14, no. 3, pp. 1–13, 2005.
[7] Pim Tuyls, Henk D. L. Hollmann, Jack H. van Lint, and Ludo M. G. M. Tolhuizen. XOR-based visual cryptography schemes. Designs, Codes and Cryptography, 37(1):169–186, 2005
[8] C.-N. Yang and D.-S. Wang, “Property analysis of XOR-based visual cryptography,” IEEE Trans. Circuits Syst. Video Technol., vol. 24, no. 2, pp. 189–197, Feb. 2014.
[9] X. Wu and W. Sun, “Extended capabilities for XOR-based visual cryptography,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 10, pp. 1592–1605, Oct. 2014.
[10] E. Verheuland H. V. Tilborg, ”Constructions And Properties Of K Out Of N Visual Secret Sharing Schemes.”Designs, Codes and Cryptography, 11(2), pp.179–196, 1997.
[11] G. Ateniese, C. Blundo, A. DeSantis, and D. R. Stinson, “Visual cryptography for general access structures”, Proc. ICAL96, Springer, Berlin,1996,pp.416-428.
[12] Jin, W. Q. Yan, and M. S. Kankanhalli, “Progressive color visual cryptography,” J. Electron. Imag., vol. 14, no. 3, pp. 1–13, 2005.