By designing the block construction for each share, which is divided into several blocks according to the number of qualified sets, the secret sharing and recovering algorithms of the XOR-based region incrementing visual cryptography are designed with the encoding matrices of the (n, n) XOR-based single secret sharing visual cryptography. Comparing with the existing schemes, the proposed scheme realizes the perfect recovery of decoded regions in secret image, and the sizes of shares are also decreased efficiently.
Fu Zheng-xin, Yu Bin, and Fang Li-guo. The access-based multi-secret visual cryptography with compression algorithm[J]. Journal of Electronics & Information Technology, 2013, 35(5): 1055-1062.
[3]
Yu B and Shen G. Multi-secret visual cryptography with deterministic contrast[J]. Multimedia Tools and Applications, 2014, 72[U3](2): 1867-1886.
[4]
Shyu S J and Jiang H W. General constructions for threshold multiple-secret visual cryptography schemes[J]. IEEE Transactions on Information Forensics Security, 2013, 8(5): 733-743.
[5]
Wang R Z. Region incrementing visual cryptography[J]. IEEE Signal Processing Letters, 2009, 16(8): 659-662.
[6]
Shyu S J and Jiang H W. Efficient construction for region incrementing visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 769-777.
[7]
Yang C N, Shih H W, Chu Y Y, et al.. New region incrementing visual cryptography scheme[C]. Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition in Conjunction with WORLDCOMP, LasVegas, USA, 2011: 323-329.
[8]
Yang C N, Shih H W, Wu C C, et al.. k out of n region incrementing scheme in visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 799-810.
[9]
Yang C N, Lin Y C, and Wu C C. Region-in-Region incrementing visual cryptography scheme[C]. Proceedings of 12th International Workshop on Digital-Forensics and Watermarking, Auckland, New Zealand, 2013 (LNCS 7809) 449-463.
[10]
Chen Y C, Tsai D S, and Horng G. A new authentication based cheating prevention scheme in Naor-Shamir’s visual cryptography[J]. The Journal of Visual Communication and Image Representation, 2012, 23[U4](8): 1225-1233.
[11]
Naor M, and Shamir A. Visual cryptography[C]. Proceedings of the Advances in Cryptology-Eurocrypt’94, Berlin, 1995 (LNCS 950): 1-12.
[12]
Ateniese G, Blundo C, Santis A D, et al.. Visual cryptography for general access structures[J]. Information and Computation, 1996, 129(2): 86-106.
[13]
Tuyls P, Hollmann H D L, Lint J H V, et al.. XOR-based visual cryptography schemes[J]. Designs, Codes and Cryptography, 2005, 37(1): 169-186.
[14]
Wang D S, Zhang L, Ma N, et al.. Two secret sharing schemes based on Boolean operations[J]. Pattern Recognition, 2007, 40(10): 2776-2785.
[15]
Liu F, Wu C, and Lin X. Step construction of visual cryptography schemes[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 27-38.
[16]
Wu X and Sun W. Random grid-based visual secret sharing with abilities of OR and XOR decryptions[J]. The Journal of Visual Communication and Image Representation, 2013, 24[U5](1): 48-62.
[17]
Yang C and Wang D S. Property analysis of XOR based visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2014, 24(2): 189-197.