Publication Type : Book Chapter
Thematic Areas : TIFAC-CORE in Cyber Security
Publisher : Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings
Source : Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings, Springer Berlin Heidelberg, Berlin, Heidelberg, p.335–340 (2014)
Url : http://dx.doi.org/10.1007/978-3-662-44966-0_32
ISBN : 9783662449660
Keywords : Perfect Reconstruction, Probabilistic scheme, Secret sharing, Visual cryptography
Campus : Coimbatore
School : Centre for Cybersecurity Systems and Networks, School of Engineering
Center : TIFAC CORE in Cyber Security
Department : Computer Science, cyber Security, Mathematics
Verified : Yes
Year : 2014
Abstract : In the literature a lot of studies were carried out on (2,nbsp;emn/em) visual cryptographic scheme (emVCS/em) using either XOR or OR operation. A scheme on ideal contrast (2,nbsp;emn/em)nbsp;emVCS/emnbsp;with reversing using combined OR and NOT operations was reported. In this paper, a construction on an ideal contrast (2,nbsp;emn/em)nbsp;emVCS/emusing combined XOR and OR operations with less amount of transparencies than ideal contrast (2,emn/em)nbsp;emVCS/emnbsp;with reversing using OR and NOT operations is proposed. This paper also shows a construction of (2,nbsp;emn/em)nbsp;emVCS/emnbsp;with pixel expansion one which perfectly reconstruct the white pixels and probabilistically reconstruct the black pixel using XOR operation.
Cite this Research Publication : K. Praveen and Dr. M. Sethumadhavan, “Results on (2, n) Visual Cryptographic Scheme”, in Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings, J. Lloret Mauri, Thampi, S. M., Rawat, D. B., and Jin, D., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014, pp. 335–340.