{"title":"Optimal Basis Matrices of a Visual Cryptography Scheme with Meaningful Shares and Analysis of Its Security","authors":"Kyohei Sekine, H. Koga","doi":"10.1587/TRANSFUN.2020DMP0010","DOIUrl":null,"url":null,"abstract":"The extended visual cryptography scheme (EVCS) proposed by Ateniese et al. is one variation of the visual cryptography scheme such that a secret image is recovered from certain qualified collections of meaningful shares that are distributed to respective participants. In this paper, we give a new definition of the EVCS for improving visibility of the recovered secret image as well as the shares. We construct optimal basis matrices with the minimum number of pixel expansion by solving a certain integer programming problem. We also analyze security of the EVCS meeting the new definition from information-theoretic viewpoint.","PeriodicalId":347402,"journal":{"name":"2020 International Symposium on Information Theory and Its Applications (ISITA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Symposium on Information Theory and Its Applications (ISITA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1587/TRANSFUN.2020DMP0010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The extended visual cryptography scheme (EVCS) proposed by Ateniese et al. is one variation of the visual cryptography scheme such that a secret image is recovered from certain qualified collections of meaningful shares that are distributed to respective participants. In this paper, we give a new definition of the EVCS for improving visibility of the recovered secret image as well as the shares. We construct optimal basis matrices with the minimum number of pixel expansion by solving a certain integer programming problem. We also analyze security of the EVCS meeting the new definition from information-theoretic viewpoint.