首页 | 本学科首页   官方微博 | 高级检索  
     


New privilege-based visual cryptography with arbitrary privilege levels
Affiliation:1. Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien, Taiwan;2. Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China;3. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China;1. Department of Electrical and Electronic Engineering, Bangladesh University of Engineering and Technology (BUET), Dhaka 1205, Bangladesh;2. Department of Electrical and Computer Engineering, North Carolina State University, Raleigh, NC 27606, USA;3. Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON M5S 2E4, Canada;1. School of Electronic Engineering, Xidian University, Xi’an 710071, China;2. VA Lab, Samsung SDS, Seoul 130-240, Republic of Korea;1. Beijing Key Laboratory of Digital Media, School of Computer Science and Engineering, Beihang University, Beijing 100191, China;2. State Key Laboratory of Virtual Reality Technology and Systems, Beihang University, Beijing 100191, China;1. School of Electronic Engineering, Xidian University, Xi’an 710071, China;2. College of Information and Communication Engineering, Sungkyunkwan University, Suwon 440-746, Republic of Korea
Abstract:Recently, Hou et al. introduced a novel (2, n) privilege-based visual cryptography scheme (PVCS) with various privilege levels of shadow images. In this scheme, a shadow with a higher privilege contributes more recovered information, while a lower privileged shadow has the less recovery capability. Moreover, the visual quality of stacked result depends on the total sum of privilege levels for all involved shadows in reconstruction. Unfortunately, the PVC scheme has the inconsistency of the contrast of recovered image and the sum of privilege levels. Accordingly, an enhanced Hou et al.’s (2, n)-PVC scheme (EPVCS) is proposed to solve this inconsistency problem. However, the EPVCS is not a general solution to implement all PVCSs with arbitrary privilege levels, and it also has the unequal whiteness of shadows. In this paper, we first extend Hou et al.’s (2, n)-EPVCS with a correct privilege levels achieving the consistency of the contrast and the sum of privilege levels. Then we construct a (2, n)-PVCS to allow arbitrary privilege levels and provide the equal whiteness for each shadow.
Keywords:Visual cryptography  Visual secret sharing  Threshold scheme  Privilege level  Contrast
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号