Cryptography Reference
In-Depth Information
C
11
C
21
C
31
C
41
C
51
C
61
105
14
208
Step
4: B
1
=
=
and B
2
=
228
90
2
C
12
C
22
C
32
C
42
C
52
C
62
130
35
63
=
.
88
61
232
Step 5: Reveal the secret image
105
130
235
14
208
35
63
45
239
A
0
= B
1
B
2
=
=
:
228
90
2
88
61
232
188
103
234
6.6 Conclusion
XOR-based visual cryptography schemes use XOR operation to decrypt the
secret. These schemes have higher contrast compared with OR-based visual
cryptography. This chapter introduced three types of different XOR-based
visual cryptography schemes. The three type schemes have their virtues re-
spectively. We also notice there is XOR-based audio cryptography, which uses
music to embed message and relies on the human auditory system to decrypt
secret messages. It is a very interesting topic, however we do not cover audio
cryptography schemes because the topic in this chapter is limited to image,
and readers can see more details in Reference [8].
Acknowledgments
The research work related to this chapter was supported by the National
Natural Science Foundation of China under Grant No. 60873249, 863 Project
of China under Grant 2008AA01Z419.
Bibliography
[1] G. Ateniese, C. Blundo, and A. D. Santis. Visual cryptography for general
access structures. In Information and Computation, volume 129, pages
86{106, 1996.
[2] E. Biham and A. Itzkovitz. Visual cryptography with polarization. In The
Dagstuhl Seminar on Cryptography, September 1997, and in the RUMP
session of CRYPTO'98, 1997.
[3] C. C. Chang, C. C. Lin, T. H. N. Le, and H. B. Le. A new probabilistic
visual secret sharing scheme for color images. In 4th International Confer-
ence on Intelligent Information Hiding and Multimedia Signal Processing,
pages 1305{1308, 2008.
Search WWH ::
Custom Search