Cryptography Reference
In-Depth Information
TABLE 4.1
Comparison of visual cryptography schemes, namely, VSSS, EVCS, and RG,
with photograph images in the case of (2; 2). Here, m denotes the pixel ex-
pansion of each scheme. S and R stand for relative differences of shadow
images and reconstructed secret image, respectively. l (O)
S
and l (O)
R denote the
tone levels of original images to be processed, while l S and l R denote the
tone levels of the resulting (encrypted/decrypted) images. Strictly speaking,
l S and l R should be 2, because every resulting image consists of white and
black subpixels. However, for human visual system, an image can be observed
as a gray-scale image because of halftoning. In this sense, we specify "l S > 2"
for EVCS and "l R > 2" for all three schemes. "mono.," "cont.," "half.," and
"rand." mean a monotone image, continuous-tone image, halftoned binary
image, and random-dot binary image, respectively.
shadow image
secret image
scheme
m
l (O)
S
l (O)
R
S
l S
R
l R
VSSS
2 (4)
0
1 (mono.)
1 (rand.)
1=2 1 (cont.) >2 (half.)
EVCS
4
1=4 1 (cont.) >2 (half.)
1=4 1 (cont.) >2 (half.)
RG
1
0
1 (mono.)
1 (rand.)
1=2 1 (cont.) >2 (half.)
to be printed on transparencies and reconstructed secret image by stacking
shadow images are binary images converted by halftoning. The pixel expan-
sion of (2; 2) EVCS is m = 4. A tradeo between relative dierences of shadow
image and reconstructed image exists. If we restrict both relative differences
to be the same, the maximum relative differences are S = R =
1
4 .
 
Search WWH ::




Custom Search