Cryptography Reference
In-Depth Information
a
j
= permute(s
A
;
j
)
3.2.1
for (each secret image i, 1 i x) do q
i
= (p
i
)
j
3.2.2
3.2.3
= btod(rotate(q
1
q
2
:::q
x
;k 1))
b
j
= permute(s
B
;
j
)
3.2.4
g
g
output(A, B) // A and B are composed by all a
j
's and b
j
's, respectively
4.
Note that a new permutation
j
is determined to permute the subpixels
in each pair of a
j
and b
j
for 1 k x to ensure the entire randomness that
the subpixels in a
j
and b
j
can provide. Further, a
j
and b
j
are encoded by
using the same permutation
j
so that the numbers of the white and black
subpixels in a
j
b
j
and s
A
b
B
are exactly the same for 1 k x.
The pixel expansion of Shyu et al.'s scheme is 2x when x secrets are shared.
In the case of x = 2, the pixel expansion is 2x = 4 which is the same as that of
Wu and Chen [12] as well as Wu and Chang [13]. The number of all possible
block in A [13] (see
Figure 3.4(a))
is 4, which contains two white and two
black subpixels, while that in b
j
of the scheme is (4!)=(2! 2!) = 6. The
randomness of this scheme, in the case of x = 2, is surely better than that of
Wu and Chen as well as Wu and Chang.
It is seen from Algorithm 1 that we do not physically store any information
are generated in the run time (Step 2 in Algorithm 1) according to formulae
(3.5) and (3.6). The encoding process is guaranteed by formulae (3.7) and
(3.8) (Step 3 in Algorithm 1).
3.4.2 Feng et al.'s Scheme
Regarding Feng et al.'s (2, 2, x) scheme [3], x secret images P
1
;P
2
;:::;P
x
are
encoded into two shares A and B. Each set of x corresponding pixels (in x
secret images) is encoded into two blocks, namely is
A
2 A and s
B
2 B, each
of which consists of x rows containing 3 pixels each. The pixel expansion is
thus 3x. The rotation relationship for revealing each of the x secrets is similar
to Shyu et al.'s scheme where the ith secret is revealed by A B
(i1)
for
1 i x. One special design in their scheme is that the encoded shares are
in the form of cylinders to avoid the distortion of the revealed secrets.
They chose four types of 3-pixel patterns, referred to as the effective block
B
e
= , ineffective block Bi=
i
= , white block Bi=
w
= and black block
B
b
= to construct s
A
and s
B
. It is evident that Bi
i
B
w
= B
i
B
b
=
, B
e
B
w
= , and B
e
B
b
= .
Figure 3.19
specifically illustrated the stacked results of these chosen pat-
terns in their scheme.
Search WWH ::
Custom Search