Abstract

A ( $k,n$ )-conventional visual cryptography (VC) scheme is designed to share one secret and each participant takes one share. When some common participants are involved in multiple VC schemes for multiple secrets, each needs to take multiple shares. This procedure needs more shares, which is inconvenient. It is desirable that the collaboration between the VC schemes can allow each common participant to keep only one share. Simply merging or gluing together two traditional ( $k_{1}$ , $n_{1}$ )- and ( $k_{2}$ , $n_{2}$ )-VC schemes, after making their pixel expansions the same, might be able to facilitate the collaboration and allow each common participant to keep only one share. But there is a security risk that when a subset of $k_{1}$ participants are from the collection of noncommon participants, some from scheme 1 and some from scheme 2, they can reconstruct secret 1, which is inconsistent with the intention of the original scheme. Similarly, $k_{2}$ noncommon participants could reconstruct secret 2. This shortcoming is inherited from the brute-force combination of traditional schemes. Therefore, a more sophisticated mechanism is required; this is the main task of this paper. In this paper, we first transform collaborative VC (CVC) schemes into the multiple secrets VC scheme with a general access structure. The construction of the basis matrices in CVC scheme between two VC schemes is formulated into an integer linear programming problem that minimizes the pixel expansion under the corresponding security and contrast constraints. Also the collaboration among more VC schemes is constructed. Finally, the experimental results illustrate the construction procedure of the CVC scheme and demonstrate the effectiveness of the CVC scheme.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.