Loading…

Size Invariant Visual Cryptography Schemes with Evolving Threshold Access Structures

In this research, we consider the evolving threshold access structure denoted as (k,\infty)for size invariant visual cryptography scheme (SIVCS). The so-called (k,\infty) threshold indicates the number of participants is supposed to be infinite and the access structure would be dynamically adjusted...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on multimedia 2024-01, Vol.26, p.1-16
Main Authors: Wu, Xiaotian, Feng, Xinjie
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In this research, we consider the evolving threshold access structure denoted as (k,\infty)for size invariant visual cryptography scheme (SIVCS). The so-called (k,\infty) threshold indicates the number of participants is supposed to be infinite and the access structure would be dynamically adjusted at any time by adding or deleting participants. First of allthe concept and definition of (k,\infty)-SIVCS are described. Shadow construction constituted by random number generators and their choosing probabilities for the (k,\infty)-SIVCS is then given. A contrast- maximizing problem for determining the generators and choosing probabilities is built based on the (k,\infty)-SIVCS. A simulated annealing-based algorithm is introduced to solve the optimization problem. The best solution from the simulated annealing-based algorithm forms a feasible (k,\infty)-SIVCS. To further improve the visual quality (k,\infty)-SIVCS using Boolean XOR decryption is also presented. Experimental results and comparisons are shown demonstrating that the propose techniques are feasible and advanced in the aspects of shadow size and contrast
ISSN:1520-9210
1941-0077
DOI:10.1109/TMM.2023.3282573