• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Hu Hao, Shen Gang, Yu Bin, Mahao Junfu. XOR-Based Region Incrementing Visual Cryptography Scheme by Random Grids[J]. Journal of Computer Research and Development, 2016, 53(8): 1857-1866. DOI: 10.7544/issn1000-1239.2016.20150058
Citation: Hu Hao, Shen Gang, Yu Bin, Mahao Junfu. XOR-Based Region Incrementing Visual Cryptography Scheme by Random Grids[J]. Journal of Computer Research and Development, 2016, 53(8): 1857-1866. DOI: 10.7544/issn1000-1239.2016.20150058

XOR-Based Region Incrementing Visual Cryptography Scheme by Random Grids

More Information
  • Published Date: July 31, 2016
  • Considering the problem of the white pixels in secret images can not be correctly recovered, which is resulted by the OR operation confined in exiting region incrementing visual cryptography schemes, a novel definition of region incrementing visual cryptography based on XOR operation is proposed for the first time. By iterating random-grid-based (k,k) single-secret visual cryptography scheme and combing the property of 0 as the generator of the {0, 1} group, the shares generation algorithm of (k,n) single-secret-sharing scheme using XOR operation is designed, and the secret sharing and recovering procedures for region incrementing scheme are proposed further. For any original secret pixel s, according to the security level, s is reassigned associated with a randomly chosen qualified set Q in the sharing procedure, and then encoded by the proposed (k,n) single-secret-sharing scheme. The recovering procedure is the same as that of the previous schemes. The effectiveness is theoretically verified at last. Experimental results show that the present scheme not only realizes no pixel expansion, but also can obtain the perfect recovery of white pixels when all the shares are stacked.
  • Related Articles

    [1]Guan Xiaoqiang, Wang Wenjian, Pang Jifang, Meng Yinfeng. Space Transformation Based Random Forest Algorithm[J]. Journal of Computer Research and Development, 2021, 58(11): 2485-2499. DOI: 10.7544/issn1000-1239.2021.20200523
    [2]Yan Shu, Chen Fan, He Hongjie. Reversible Data Hiding in Encrypted Image Based on Neighborhood Prediction Using XOR-Permutation Encryption[J]. Journal of Computer Research and Development, 2018, 55(6): 1211-1221. DOI: 10.7544/issn1000-1239.2018.20170295
    [3]Xiong Gang, Ping Xijian, Zhang Tao, Li Kan. Steganalysis of LSB Matching Based on the Measurement of the Region Randomness[J]. Journal of Computer Research and Development, 2013, 50(5): 942-950.
    [4]Chen Ping, Xing Xiao, Xin Zhi, Wang Yi, Mao Bing, and Xie Li. Protecting Programs Based on Randomizing the Encapsulated Structure[J]. Journal of Computer Research and Development, 2011, 48(12): 2227-2234.
    [5]Deng Ning, Ji Weixing, Shi Feng, and Song Hong. A Random Sampling Based SPM Management Mechanism[J]. Journal of Computer Research and Development, 2011, 48(5): 897-905.
    [6]Zhu Hegui, Zhang Xiangde, Yang Lianping, and Tang Qingsong. Fingerprint-Based Random Sequence Generator[J]. Journal of Computer Research and Development, 2009, 46(11): 1862-1867.
    [7]Fan Limin, Feng Dengguo, Zhou Yongbin. A Fuzzy-Based Randomness Evaluation Model for Block Cipher[J]. Journal of Computer Research and Development, 2008, 45(12): 2095-2101.
    [8]Shi Rui and Yang Xiaozong. Research on the Node Spatial Probabilistic Distribution of the Random Waypoint Mobility Model for Ad Hoc Network[J]. Journal of Computer Research and Development, 2005, 42(12): 2056-2062.
    [9]Yu Qiangyuan, Liu Dayou, and Wang Shengsheng. A Hierarchical Topological Relations Model of Fuzzy Raster Regions[J]. Journal of Computer Research and Development, 2005, 42(7): 1166-1172.
    [10]Zhu Junmao, Yang Shoubao, Fan Jianping, Chen Mingyu. A Grid & P2P Trust Model Based on Recommendation Evidence Reasoning[J]. Journal of Computer Research and Development, 2005, 42(5): 797-803.

Catalog

    Article views (1060) PDF downloads (392) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return