Proceedings of the 2015 International Conference on Electrical, Computer Engineering and Electronics

A K out of K+1 Visual Cryptography Scheme

Authors
Benlan Liu, Shundong Li, Daoshun Wang
Corresponding Author
Benlan Liu
Available Online June 2015.
DOI
10.2991/icecee-15.2015.308How to use a DOI?
Keywords
visual cryptography; visual secret sharing scheme; basic matrices
Abstract

Naor and Shamir proposed an optimal (k, k visual cryptography scheme (VCS). Droste extended the (k, k) scheme to (k, n) scheme. Based on properties of 0 and 1’s permutations of basic matrices, we use basic matrices of the (k, k) scheme to constrict basic matrices of (k, k+1) scheme.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 International Conference on Electrical, Computer Engineering and Electronics
Series
Advances in Computer Science Research
Publication Date
June 2015
ISBN
978-94-62520-81-3
ISSN
2352-538X
DOI
10.2991/icecee-15.2015.308How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Benlan Liu
AU  - Shundong Li
AU  - Daoshun Wang
PY  - 2015/06
DA  - 2015/06
TI  - A K out of K+1 Visual Cryptography Scheme
BT  - Proceedings of the 2015 International Conference on Electrical, Computer Engineering and Electronics
PB  - Atlantis Press
SP  - 1636
EP  - 1641
SN  - 2352-538X
UR  - https://doi.org/10.2991/icecee-15.2015.308
DO  - 10.2991/icecee-15.2015.308
ID  - Liu2015/06
ER  -