Cryptography Reference
In-Depth Information
the search space for good schemes, it guarantees that the reconstructed pixels
are exactly of the same original color (and not a darker version of it).
If we consider a model that requires this special property the c-color (n;n)-
threshold schemes of [4] are optimal with respect to the pixel expansion:
Theorem 3 [4] If the shares are restricted to be such that for any superposi-
tion it is possible to have at most one colored pixel, any c-color (n;n)-threshold
scheme has pixel expansion m c2 n2 .
Other results presented in [4]:
A construction of c-color (2;n)-threshold with pixel expansion m = c(n1).
A matching lower bound m c(n 1).
2
A construction of c-color (2;n)-threshold with contrast =
cn . The contrast
is dened as = (h `)=m and the thresholds h and ` satisfy the weak
contrast property.
An upper bound on the contrast cn . This matches the construction for
k = 2.
2.6 Schemes for the General Model
In this last section we finally describe schemes for Color-VC that consider
the General model, that is we consider schemes that superimpose pixels with
dierent colors. In the rest of the section, we present several (2; 2)-threshold
schemes from [7, 1] and a construction for (2;n)-threshold schemes from [1].
2.6.1 (2; 2)-Threshold Schemes
In this section, we present schemes for the particular case of k = n = 2.
Scheme 1 [7]
The
secret
palette
is f Y ; C ; G g while
the
shares
palette
is
f Y ; C ; G ;;g. The base matrices are:
Y C
YC
C Y
CY
YC
CY
S C =
S G =
S Y =
It is easy to see that for this scheme the pixel expansion is m = 4 and we
have h = 2, ` = 0. The annihilator presence is = 1=2 because 2 out of 4
pixels are annihilated.
 
 
Search WWH ::




Custom Search