Cryptography Reference
In-Depth Information
will be always mapped to a black pixel in each of the computed shares A
i
because of the and operation performed in the computation of the C
j
(for a
'0' pixel, C
j
= B
j
& 0 = 0) and the XOR operation in the reconstruction
phase (the contribution for C
j
= 0 means that A
j
= B
n+1
C
j
= B
n+1
and then A
0
= A
j
A
k
= B
n+1
B
n+1
= 0. Then p
bjb
= 1 and p
wjb
= 0.
A white pixel will be reconstructed according to the pixel returned after the
XOR between the two matrices Bi
i
and B
k
, which are randomly selected. Then
p
wjw
= p
bjw
= 1=2. Hence, the construction returns a = 1=2 probabilistic
scheme with contrast 1=2.
The same construction has been extended by Wang et al. in [21] to deal
with grayscale images. Basically each pixel is coded with a binary string g1
bits long, where g denotes the gray level number, and having a number of "1"s
equivalent to the 1s present in the binary string obtained by the grey level g
(without respecting the order). A pixel having grey level k in a range from 0
to g1, is represented by a binary string having gk '0's and k1 '1's. The
construction returns a probabilistic scheme with m = g 1.
5.8 Conclusions and Open Problems
The probabilistic model for VCS schemes has been first described in Yang [22],
where the reconstruction of the secret pixel has been given in probabilistic
terms, no more guaranteeing the correctness property of the traditional VCS
schemes. A generalization of the model has been given then in [11], where
probabilistic schemes with pixel expansion have been described, showing that
there is a one-to-one correspondence between probabilistic schemes with no
pixel expansion and deterministic schemes and that such a one-to-one map-
ping trades the probabilistic nature of the scheme with the contrast of the
deterministic scheme. Probabilistic schemes with pixel expansion can be ob-
tained from deterministic schemes and their probabilistic factors can be stud-
ied. While for (n;n)-threshold schemes it has been proved that there is a
linear relation between the pixel expansion and the probabilistic factor, for
(2;n)-threshold schemes no closed expression for the probabilistic factor has
been found. Finally, a probabilistic model has been extended and alternative
operations (instead of OR) have been considered for the distribution of the
shares and the reconstruction of the secret images.
Search WWH ::
Custom Search