Cryptography Reference
In-Depth Information
8.2 Preliminaries
For the moment we will ignore the pixel expansion and the randomness. Then
contrast optimal visual cryptography schemes can be simplified.
Lemma 1 Let be any access structure then there exists a contrast optimal
visual cryptography scheme (M W ;M B ) for with the property thatM W is the
multiset of all column permutations of a matrix M W andM B is the multiset
of all column permutations of a matrix M B .
Proof
Let (M 0 W ;M 0 B ) be a contrast optimal visual cryptography scheme for with
pixel expansion m and randomness r.
Let M W = (M 0 W (1) ;:::;M 0 W (r) ) be the n (mr) matrix which consist of
all matrices M 0 W (i) 2M 0 W (i = 1;:::;r) written in sequence, one after the
other. Similarly let M B be the n (mr) matrix that consists of the matrices
inM 0 B written after each other.
Let G 2 , by Denition 1 (b) the restriction of M W and M B to the rows
i 2 must give return two matrices that dierent only for a permutation of
their columns, i.e., the scheme (M W ;M B ) satisfies the security requirement
(Definition 1 (b)).
Now let G 2 by Denition 1 (c) the restriction of every matrix inM B to
the rows i 2 contains at least m more nonzero columns than the restriction
of a matrix inM W to the same rows. Thus, the restriction of M B to the rows
i 2 contains at least mr more nonzero columns than the restriction of M W
to the rows i 2 . That proves that the scheme (M W ;M B ) reconstructs the
secret image.
2
The advantage of the scheme constructed by Lemma 1 is that the visual
cryptography scheme is now described by just two Boolean matrices M 0 W and
M 0 B instead of two multisets of Boolean matrices. Moreover the order of the
columns in M 0 W and M 0 B does not matter. For each S f1;:::;ng let x (W)
S
denote the number of columns in M 0 W with 1 in the rows corresponding to
S and 0 in the other rows. Similarly define the variables x (B)
S
. The scheme is
described completely by the values x (B S , x (W S .
The security requirements of the visual cryptography scheme translates to
the linear equations
X
= X
Sf1;:::ng
S\G6=0
x (W)
s
x (B)
s
(8.1)
Sf1;:::ng
S\G6=0
for all G 2 and the requirement that a qualied subset can see the image
translates to
X
< X
Sf1;:::ng
S\G6=0
x (W)
s
x (B)
s
(8.2)
Sf1;:::ng
S\G6=0
 
 
Search WWH ::




Custom Search