Cryptography Reference
In-Depth Information
C 11 C 21 C 31
C 41 C 51 C 61
105
14
208
Step
4: B 1
=
=
and B 2
=
228
90
2
C 12 C 22 C 32
C 42 C 52 C 62
130
35
63
=
.
88
61
232
Step 5: Reveal the secret image
105
130
235
14
208
35
63
45
239
A 0 = B 1 B 2 =
=
:
228
90
2
88
61
232
188
103
234
6.6 Conclusion
XOR-based visual cryptography schemes use XOR operation to decrypt the
secret. These schemes have higher contrast compared with OR-based visual
cryptography. This chapter introduced three types of different XOR-based
visual cryptography schemes. The three type schemes have their virtues re-
spectively. We also notice there is XOR-based audio cryptography, which uses
music to embed message and relies on the human auditory system to decrypt
secret messages. It is a very interesting topic, however we do not cover audio
cryptography schemes because the topic in this chapter is limited to image,
and readers can see more details in Reference [8].
Acknowledgments
The research work related to this chapter was supported by the National
Natural Science Foundation of China under Grant No. 60873249, 863 Project
of China under Grant 2008AA01Z419.
Bibliography
[1] G. Ateniese, C. Blundo, and A. D. Santis. Visual cryptography for general
access structures. In Information and Computation, volume 129, pages
86{106, 1996.
[2] E. Biham and A. Itzkovitz. Visual cryptography with polarization. In The
Dagstuhl Seminar on Cryptography, September 1997, and in the RUMP
session of CRYPTO'98, 1997.
[3] C. C. Chang, C. C. Lin, T. H. N. Le, and H. B. Le. A new probabilistic
visual secret sharing scheme for color images. In 4th International Confer-
ence on Intelligent Information Hiding and Multimedia Signal Processing,
pages 1305{1308, 2008.
 
 
Search WWH ::




Custom Search