Cryptography Reference
In-Depth Information
of less than four shares tells anything about B. fR
1
;R
2
;R
3
;R
4
g is indeed a
set of VCRG-4.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
FIGURE 7.12
Results of Algorithms 4 for VCRG-4 with respect to binary image B: (a) B;
(b) R
1
, (c) R
2
, (d) R
3
, (e) R
4
; (f) R
1
R
2
; (g) R
1
R
2
R
3
; (h) R
1
R
2
;
(g) R
1
R
2
R
3
R
4
.
Since n = 4 in this experiment, we have
T
(R
i
) = 1=2 (see Figures 7.12(b){
(e)),
(R
i
R
j
R
k
) = 1=8 (see (g)) for
1 6 i 6= j 6= k 6 4. Further, from
Table 7.6
we know that the light contrast
of Algorithm 4 is c(
T
(R
i
R
j
) = 1=4 (see (f)), and
T
results of Algorithm 8 for color VCRG-4 where Eycrypt cVCRG (P
x
,x, 4)
was based upon Algorithm 4 with respect to P (see
Figure 7.9(a))
.
Figures
7.13(a){(d) are the color random gridsR
1
;R
2
;R
3
;R
4
produced; (e) presents
the result ofR
1
R
2
; (f) shows that ofR
1
R
2
R
3
; and (g) gives that of
R
1
R
2
R
3
R
4
. As seen from Figure 7.13, we realize that fR
1
R
2
R
3
R
4
g is a set of color VCRG-4 of P.
The results of the above four experiments are visualized evidences to the
correctness of Theorems 2{4. The proposed schemes (Algorithms 4-8) in pro-
ducing VCRG-n for a secret image are feasible and applicable. Among the
Search WWH ::
Custom Search