Constructions and bounds for visual cryptography

Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

118 Scopus citations

Abstract

A visual cryptography scheme for a set P of η participants is a method to encode a secret image SI into η images in such a way that any participant in P receives one image and only qualified subsets of participants can “visually” recover the secret image, but non-qualified sets of participants have no information, in an information theoretical sense, on SI. A “visual” recover for a set X ⊆ P consists of stacking together the images associated to participants in X. The participants in a qualified set X will be able to see the secret image without any knowledge of cryptography and without performing any cryptographic computation. In this paper we propose two techniques to construct visual cryptography schemes for any access structure. We analyze the structure of visual cryptography schemes and we prove bounds on the size of the image distributed to the participants in the scheme. We provide a novel technique to realize k out of η visual cryptography schemes. Finally, we consider graph-based access structures, that is access structures in which any qualified set of participants contains at least an edge of a given graph whose vertices represent the participants of the scheme. Our constructions for 2 out of n visual cryptography schemes are the best possible with respect to pixel expansion and relative difference.

Original languageEnglish
Title of host publicationAutomata, Languages and Programming - 23rd International Colloquium, ICALP 1996, Proceedings
EditorsFriedhelm Meyer auf der Heide, Burkhard Monien
Pages416-428
Number of pages13
DOIs
StatePublished - 1996
Event23rd International Colloquium on Automata, Languages, and Programming, ICALP 1996 - Paderborn, Germany
Duration: 8 Jul 199612 Jul 1996

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1099
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference23rd International Colloquium on Automata, Languages, and Programming, ICALP 1996
Country/TerritoryGermany
CityPaderborn
Period8/07/9612/07/96

Fingerprint

Dive into the research topics of 'Constructions and bounds for visual cryptography'. Together they form a unique fingerprint.

Cite this