{"title":"Visual Cryptography Schemes for Graph Based Access Structures","authors":"S. Cimato","doi":"10.1109/IIH-MSP.2013.98","DOIUrl":null,"url":null,"abstract":"Visual cryptography schemes (VCS) have been introduced by Naor and Shamir [NS94] and involve a dealer encoding a secret image into shares that are distributed to a number of participants. In general, the collection of subsets of participants that can recover the secret is organized in an access structure. In this paper we consider graph based access structures, where participants are nodes of a graph G and only subsets containing an edge are allowed to reconstruct the secret image. We provide some bounds on the pixel expansion of path and cycle graphs, showing also a simple construction for such graphs for a generic number of n participants.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIH-MSP.2013.98","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Visual cryptography schemes (VCS) have been introduced by Naor and Shamir [NS94] and involve a dealer encoding a secret image into shares that are distributed to a number of participants. In general, the collection of subsets of participants that can recover the secret is organized in an access structure. In this paper we consider graph based access structures, where participants are nodes of a graph G and only subsets containing an edge are allowed to reconstruct the secret image. We provide some bounds on the pixel expansion of path and cycle graphs, showing also a simple construction for such graphs for a generic number of n participants.