{"title":"单色视觉密码方案的若干结构","authors":"A. Adhikari, B. Roy","doi":"10.1109/INFTECH.2008.4621609","DOIUrl":null,"url":null,"abstract":"Most of the secret sharing schemes are based on algebraic calculations in their realizations. But there are some different realizations of the secret sharing schemes. Visual cryptography is one such secret sharing scheme. In a visual cryptographic scheme, for a set P of n participants, a secret image is split into n shadow images called shares, where each participant in P receives one share. Certain qualified subsets of participants can “visually” recover the secret image with some loss of contrast, but other forbidden sets of participants have no information about the secret image. In this paper we review with appropriate examples some of the methods for the construction of monochrome visual cryptographic schemes for general as well as for threshold access structures.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"On some constructions of monochrome visual cryptographic schemes\",\"authors\":\"A. Adhikari, B. Roy\",\"doi\":\"10.1109/INFTECH.2008.4621609\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Most of the secret sharing schemes are based on algebraic calculations in their realizations. But there are some different realizations of the secret sharing schemes. Visual cryptography is one such secret sharing scheme. In a visual cryptographic scheme, for a set P of n participants, a secret image is split into n shadow images called shares, where each participant in P receives one share. Certain qualified subsets of participants can “visually” recover the secret image with some loss of contrast, but other forbidden sets of participants have no information about the secret image. In this paper we review with appropriate examples some of the methods for the construction of monochrome visual cryptographic schemes for general as well as for threshold access structures.\",\"PeriodicalId\":247264,\"journal\":{\"name\":\"2008 1st International Conference on Information Technology\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-05-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 1st International Conference on Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INFTECH.2008.4621609\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 1st International Conference on Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFTECH.2008.4621609","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On some constructions of monochrome visual cryptographic schemes
Most of the secret sharing schemes are based on algebraic calculations in their realizations. But there are some different realizations of the secret sharing schemes. Visual cryptography is one such secret sharing scheme. In a visual cryptographic scheme, for a set P of n participants, a secret image is split into n shadow images called shares, where each participant in P receives one share. Certain qualified subsets of participants can “visually” recover the secret image with some loss of contrast, but other forbidden sets of participants have no information about the secret image. In this paper we review with appropriate examples some of the methods for the construction of monochrome visual cryptographic schemes for general as well as for threshold access structures.