Cryptography Reference
In-Depth Information
Proof
Let M B be the matrix describing the encoding of a black pixel. As in the proof
of Theorem 8 we find that each transparency must have the same number w
of black subpixels and each two transparencies must share the same number
< w of black subpixels. Interpret M B as an integer matrix, then
M B M B = (w)I + J :
This matrix has a full rank (det(w)I +J = (w) n1 (n+w)) and
hence,
4n 1 = rank M B M B rank M B m :
(This is the Fisher's inequality.)
Now assume m = 4n 3 then w must be either 2n 1 or 2n. In the
first case every column of M W must contain 2n 1 entries 1 and M W is the
incidence matrix of a 2(4n1; 2n1;n1) design. In the second case every
column of M W must contain 2n entries 1 and M W is the incidence matrix of
a 2(4n1; 2n;n) design. But then the complement of M W is the incidence
matrix of a 2 (4n 1; 2n 1;n 1) design. This shows that a contrast
optimal 2-out-of-(4n 1) visual cryptography scheme with pixel expansion
m = 4n 3 implies the existence of a 2 (4n 1; 2n 1;n 1) design.
But conversely you get a 2-out-of-(4n 1) visual cryptography scheme from
a 2(4n1; 2n1;n1) design by dening M B to be the incidence matrix
of the design and encode it with a pixel by choosing on all transparencies the
same subpixels.
Now we prove that the existence of 2 (4n 1; 2n 1;n 1) design is
equivalent to the existence of a Hadamard matrix of order 4n.
Multiplying a row or a column of a Hadamard matrix with 1 again gives
a Hadamard matrix. So without loss of generality we may assume that the
first row and the first column of a Hadamard matrix has only 1 as entries. Let
H be a Hadamard matrix of order 4n in that normal from. All rows except
the rst row of H must contain 2n entries 1 and for two rows dierent rows
must differ in exactly 2n columns. Hence, after deleting the first row and first
column H forms the incidence matrix of a 2 (4n 1; 2n 1;n 1) design
(with 1 instead of 0 to mark that a point is not incident with a block).
Conversely the incidence matrix of a 2 (4n 1; 2n 1;n 1) becomes a
Hadamard matrix, if one replaces all 0 by 1 and adds an extra column and
an extra row that contains only 1.
2
Other 2-out-of-n visual cryptography schemes are also connected to
Hadamard matrices.
Result 11 (see [3] Theorem 4.9) The minimal pixel expansion m of con-
trast optimal 2-out-of-n visual cryptography schemes satisfies:
8
<
2n 2
if n even
m
n
if n 3
mod 4
:
2n
if n 1
mod 4
 
Search WWH ::




Custom Search