09.01.2013 Views

SESSION NOVEL ALGORIHMS AND APPLICATIONS + ...

SESSION NOVEL ALGORIHMS AND APPLICATIONS + ...

SESSION NOVEL ALGORIHMS AND APPLICATIONS + ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

28 Int'l Conf. Foundations of Computer Science | FCS'11 |<br />

A 4 out of n Secret Sharing Scheme in Visual Cryptography without Expansion<br />

Ying-Yu Chen<br />

Department of Computer Science and Information<br />

Engineering, National Chi Nan University<br />

Puli, Nantou 54561, Taiwan, R.O.C.<br />

e-mail: s99321514@ncnu.edu.tw<br />

AbstractVisual cryptography (VC, for short) encrypts the<br />

secret image into n shares (transparency). We cannot see any<br />

information from any one share, and decrypt the original image<br />

by stacking all of the shares. Now, we extend it to the k out of n<br />

secret sharing scheme. (k, n) threshold secret sharing scheme<br />

encrypts as the same way and decrypts the original image by<br />

stacking at least k shares. If one stacks less than k shares, he (or<br />

she) cannot recognize the secret image. In this paper, we<br />

construct a new scheme for (4, n) threshold secret sharing<br />

encrypt in VC by using a method of combination and the size of<br />

the share is as small as the original image. That is, there is no<br />

expanded need while some of the previous scheme need.<br />

Keywords-visual cryptography; secret sharing scheme; security;<br />

share.<br />

I. INTRODUCTION<br />

Visual cryptography (VC, for short) and the (k,<br />

n)-threshold secret sharing scheme were proposed by<br />

Naor and Shamir in 1995 [9]. Visual cryptography<br />

means the secret image is turned into n shares that<br />

combined with black and white pixel, and the<br />

decrypting by stacking the shares together to reveal<br />

the secret image. So we can decrypt the secret image<br />

by human’s eye without using computer. The (k,<br />

n)-threshold secret sharing scheme means a dealer<br />

sends a share to each of the n users. In the condition<br />

of k is small or equal than n, the fewer than k users<br />

stack their shares together, they cannot see any<br />

information from the image. But at least k users stack<br />

their shares together, they will find out the secret from<br />

the image.<br />

In most of the VC scheme [2, 4, 7, 8, 9, 10, 12],<br />

the pixel of each share will expand. The more value of<br />

n is, the more value of the expansion will be.<br />

However, the size of the share is larger than the<br />

original image. In 1995, Naor and Shamir [9]<br />

proposed some (k, n)-threshold secret sharing in VC<br />

for three kinds of condition. First, some of their<br />

schemes are the efficient solutions for (2, n) and (3, n).<br />

Second, they propose a general k out of k scheme.<br />

_________________________________<br />

* Corresponding author.<br />

Justie Su-Tzu Juan *<br />

Department of Computer Science and Information<br />

Engineering, National Chi Nan University<br />

Puli, Nantou 54561, Taiwan, R.O.C.<br />

e-mail: jsjuan@ncnu.edu.tw<br />

Third, they propose a general k out of n scheme when<br />

k is small or equal than n. But the pixel of each share<br />

will expand in their later two methods. For<br />

convenience, the third method is called NS scheme in<br />

this paper.<br />

In 2008, Fang et al. propose a new algorithm<br />

(called FLL scheme in this paper) [6]. They solve the<br />

problem in expansion. In FLL scheme, the authors use<br />

Hilbert-curve [1] and two queues to present a VC<br />

scheme. The shares they generate are as small as the<br />

input image S, so the pixel of each share won’t<br />

expand. But since Fang et al. use Naor and Shamir’s<br />

scheme to design their scheme, the more number of<br />

the expansion in Naor and Shamir’s scheme is, the<br />

image we decrypted will be more unclear in FLL<br />

scheme.<br />

Another subject has been considered these years,<br />

progressive visual secret sharing (PVSS, for shout)<br />

scheme [3, 5]. In 2011, Hou et al. propose a new<br />

algorithm for (2, n) threshold PVSS scheme [3].<br />

In above researches, no matter the shares will be<br />

expansion or not, it cannot reveal the secret image by<br />

stacking less than k shares and it can reveal the secret<br />

image by stacking at least k shares for k ≥ 4. Because<br />

the expansion in the most of (4, n)-threshold secret<br />

sharing scheme in VC is quite large and the image we<br />

decrypted will be not clear in FLL scheme for (4,<br />

n)-threshold secret sharing scheme in VC. Hence, we<br />

propose a new scheme to improve it. We use the<br />

theory of combination to construct the scheme.<br />

Actually, our scheme is also a (4, n) threshold PVSS<br />

scheme. The detail of our scheme is presented on next<br />

section. Some experiment results are given in section<br />

, and the conclusion is stated in section .<br />

II. THE PROPOSED SCHEME<br />

We will show our (4, n)-threshold secret sharing<br />

scheme in VC as follows. For convenience, let

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!