Random grid-based visual secret sharing for general access structures with cheat-preventing ability

► We propose a RG-based VSS for general access structures. ► Pixel expansion problem is solve in the proposed scheme. ► Complex sharing strategy can be realized by the proposed scheme. ► A cheating immune method is proposed to prevent VSS from being cheated. Conventional visual secret sharing (VSS)...

Full description

Saved in:
Bibliographic Details
Published inThe Journal of systems and software Vol. 85; no. 5; pp. 1119 - 1134
Main Authors Wu, Xiaotian, Sun, Wei
Format Journal Article
LanguageEnglish
Published New York Elsevier Inc 01.05.2012
Elsevier Sequoia S.A
Subjects
Online AccessGet full text
ISSN0164-1212
1873-1228
DOI10.1016/j.jss.2011.12.041

Cover

Abstract ► We propose a RG-based VSS for general access structures. ► Pixel expansion problem is solve in the proposed scheme. ► Complex sharing strategy can be realized by the proposed scheme. ► A cheating immune method is proposed to prevent VSS from being cheated. Conventional visual secret sharing (VSS) encodes a secret image into shares which are m times as big as the secrets. m is called pixel expansion. Random grid (RG) is an approach to solve pixel expansion problem. However, the existing VSS methods using RGs are confined to (2,n),(n,n) and (k,n). In this paper, RG-based VSS schemes for general access structures are proposed. The proposed algorithms can encode one secret image into n random grids while qualified sets can recover the secret visually. Furthermore, a cheating immune method is also presented to provided extra ability of cheat-preventing for RG-based VSS. Experimental results demonstrate that both the RG-based VSS for general access structures and cheating immune method are effective. More complicated sharing strategies can be implemented.
AbstractList Conventional visual secret sharing (VSS) encodes a secret image into shares which are m times as big as the secrets. m is called pixel expansion. Random grid (RG) is an approach to solve pixel expansion problem. However, the existing VSS methods using RGs are confined to (2,n),(n,n) and (k,n). In this paper, RG-based VSS schemes for general access structures are proposed. The proposed algorithms can encode one secret image into n random grids while qualified sets can recover the secret visually. Furthermore, a cheating immune method is also presented to provided extra ability of cheat-preventing for RG-based VSS. Experimental results demonstrate that both the RG-based VSS for general access structures and cheating immune method are effective. More complicated sharing strategies can be implemented.
Conventional visual secret sharing (VSS) encodes a secret image into shares which are m times as big as the secrets. m is called pixel expansion. Random grid (RG) is an approach to solve pixel expansion problem. However, the existing VSS methods using RGs are confined to (2,n),(n,n) and (k,n). In this paper, RG-based VSS schemes for general access structures are proposed. The proposed algorithms can encode one secret image into n random grids while qualified sets can recover the secret visually. Furthermore, a cheating immune method is also presented to provided extra ability of cheat-preventing for RG-based VSS. Experimental results demonstrate that both the RG-based VSS for general access structures and cheating immune method are effective. More complicated sharing strategies can be implemented. [PUBLICATION ABSTRACT]
► We propose a RG-based VSS for general access structures. ► Pixel expansion problem is solve in the proposed scheme. ► Complex sharing strategy can be realized by the proposed scheme. ► A cheating immune method is proposed to prevent VSS from being cheated. Conventional visual secret sharing (VSS) encodes a secret image into shares which are m times as big as the secrets. m is called pixel expansion. Random grid (RG) is an approach to solve pixel expansion problem. However, the existing VSS methods using RGs are confined to (2,n),(n,n) and (k,n). In this paper, RG-based VSS schemes for general access structures are proposed. The proposed algorithms can encode one secret image into n random grids while qualified sets can recover the secret visually. Furthermore, a cheating immune method is also presented to provided extra ability of cheat-preventing for RG-based VSS. Experimental results demonstrate that both the RG-based VSS for general access structures and cheating immune method are effective. More complicated sharing strategies can be implemented.
Author Sun, Wei
Wu, Xiaotian
Author_xml – sequence: 1
  givenname: Xiaotian
  surname: Wu
  fullname: Wu, Xiaotian
  email: wxt.sysu@gmail.com, wuxiaotian_sysu@yahoo.cn
  organization: School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510006, China
– sequence: 2
  givenname: Wei
  surname: Sun
  fullname: Sun, Wei
  organization: School of Software, Sun Yat-sen University, Guangzhou 510006, China
BookMark eNp9kE1r3DAQQEVJoZs0PyA30VMvdiVZXtn0VEK_IFAozVnI4_GujFfaauQt-ffRsj3lkJMG9N4wvGt2FWJAxu6kqKWQ209zPRPVSkhZS1ULLd-wjexMU0mluiu2KYwus1Tv2DXRLIQwSqgNg98ujPHAd8mP1eAIR37ytLqFE0LCzGnvkg87PsXEdxgwlS8HgEScclohrwmJ__N5z2GPLlfHhCcM-ey4wS8-P71nbye3EN7-f2_Y47evf-5_VA-_vv-8__JQQdOaXLltKwxqRAl9P7V6GLTRDtXW9I3TGjrVKA1tOzagwEk9Ya9Nj63SWg7tODY37ONl7zHFvytStgdPgMviAsaVrBSlRSdE1xf0wwt0jmsK5Trbq9Zse6V0gcwFghSJEk4WfHbZx5CT80vZZ8_t7WxLe3tub6WypX0x5QvzmPzBpadXnc8XB0uik8dkCTwGwNEnhGzH6F-xnwGZb59P
CODEN JSSODM
CitedBy_id crossref_primary_10_1007_s11042_018_6738_2
crossref_primary_10_1016_j_jvcir_2019_02_008
crossref_primary_10_1016_j_jisa_2017_01_001
crossref_primary_10_4018_IJDCF_2018070104
crossref_primary_10_32604_jnm_2023_039962
crossref_primary_10_1002_sec_769
crossref_primary_10_1007_s13369_016_2124_4
crossref_primary_10_1109_TIP_2023_3263101
crossref_primary_10_1016_j_jss_2013_03_062
crossref_primary_10_1016_j_image_2019_03_017
crossref_primary_10_1080_19393555_2019_1567872
crossref_primary_10_1007_s44230_023_00056_w
crossref_primary_10_1007_s11042_018_6478_3
crossref_primary_10_1016_j_sigpro_2013_06_003
crossref_primary_10_4236_jis_2015_64027
crossref_primary_10_1007_s11042_020_10352_3
crossref_primary_10_1109_TIFS_2013_2274955
crossref_primary_10_1007_s11042_019_07807_7
crossref_primary_10_1016_j_sigpro_2013_10_023
crossref_primary_10_1016_j_procs_2015_02_077
crossref_primary_10_1016_j_image_2019_08_007
crossref_primary_10_1016_j_jvcir_2020_102793
crossref_primary_10_1007_s00542_016_3104_z
crossref_primary_10_1109_TIFS_2014_2346014
crossref_primary_10_1016_j_jss_2014_03_079
crossref_primary_10_1016_j_jvcir_2019_03_020
crossref_primary_10_1109_TMM_2023_3282573
crossref_primary_10_4018_IJCVIP_2018040103
Cites_doi 10.1007/BFb0053419
10.1007/978-3-540-79499-8_16
10.1109/MARK.1979.8817296
10.1007/s10623-005-6342-0
10.3233/FI-2009-0064
10.1016/j.sigpro.2011.09.015
10.1016/j.patcog.2007.01.013
10.1023/A:1008280705142
10.1016/j.patcog.2008.08.023
10.1016/j.patcog.2005.06.010
10.1006/inco.1996.0076
10.1109/TIP.2006.884916
10.1016/j.patcog.2006.02.025
10.1364/OL.12.000377
10.1145/359168.359176
10.1016/j.jss.2011.02.023
10.1007/s001459900057
10.1016/S0031-3203(02)00258-3
10.1007/BFb0045084
10.1016/S0304-3975(99)00127-9
10.1016/S0020-0190(00)00108-3
10.1016/j.patcog.2008.11.015
ContentType Journal Article
Copyright 2011 Elsevier Inc.
Copyright Elsevier Sequoia S.A. May 2012
Copyright_xml – notice: 2011 Elsevier Inc.
– notice: Copyright Elsevier Sequoia S.A. May 2012
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.jss.2011.12.041
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts
Computer and Information Systems Abstracts

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1873-1228
EndPage 1134
ExternalDocumentID 2600142141
10_1016_j_jss_2011_12_041
S0164121211003220
Genre Feature
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29L
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
9M8
AABNK
AACTN
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
AAYOK
ABBOA
ABEFU
ABFNM
ABFRF
ABFSI
ABJNI
ABMAC
ABTAH
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACGOD
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADHUB
ADJOM
ADMUD
AEBSH
AEFWE
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AI.
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
RNS
ROL
RPZ
RXW
SBC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
TAE
TN5
TWZ
UHS
UNMZH
VH1
WUQ
XPP
ZMT
ZY4
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
7SC
8FD
AFXIZ
AGCQF
AGRNS
JQ2
L7M
L~C
L~D
SSH
ID FETCH-LOGICAL-c357t-a6507e4ee1c99f54bb474ae26793a44c82324c55d3c2ca14fe9479e52441b5dd3
IEDL.DBID .~1
ISSN 0164-1212
IngestDate Sat Sep 27 20:01:00 EDT 2025
Fri Jul 25 02:35:01 EDT 2025
Thu Apr 24 23:02:52 EDT 2025
Wed Oct 01 04:23:09 EDT 2025
Fri Feb 23 02:32:34 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 5
Keywords Visual secret sharing
Access structure
Random grid
Cheating immune
Language English
License https://www.elsevier.com/tdm/userlicense/1.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c357t-a6507e4ee1c99f54bb474ae26793a44c82324c55d3c2ca14fe9479e52441b5dd3
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-2
content type line 23
PQID 925769224
PQPubID 45802
PageCount 16
ParticipantIDs proquest_miscellaneous_1022880089
proquest_journals_925769224
crossref_citationtrail_10_1016_j_jss_2011_12_041
crossref_primary_10_1016_j_jss_2011_12_041
elsevier_sciencedirect_doi_10_1016_j_jss_2011_12_041
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2012-05-01
PublicationDateYYYYMMDD 2012-05-01
PublicationDate_xml – month: 05
  year: 2012
  text: 2012-05-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle The Journal of systems and software
PublicationYear 2012
Publisher Elsevier Inc
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier Inc
– name: Elsevier Sequoia S.A
References Horng, Chen, Tsai (bib0050) 2006; 38
Hou (bib0055) 2003; 36
Naor, Shamir (bib0075) 1995; 950
Shyu (bib0090) 2007; 40
Blundo, De Santis, Naor (bib0020) 2000; 75
Hofmeister, Krause, Simon (bib0045) 1997
Ateniese, Blundo, Santis, Stinson (bib0010) 2001; 250
Shyu (bib0085) 2006; 39
Blakley, G.R., 1979. Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, vol. 48, pp. 313–317.
,
Chen, Tsao (bib0040) 2011; 84
Blundo, De Santis, Stinson (bib0025) 1999; 12
Wang, D., Li, X., Yi, F., 2008. Probabilistic
Hu, Tzeng (bib0060) 2007; 16
Chang, Chen, Liu (bib0030) 2009; 92
visual secret sharing scheme for grayscale images. In: Information Security and Cryptology, Springer, pp. 192–200.
Tsai, Chen, Horng (bib0100) 2007; 40
Shamir (bib0080) 1979; 22
Ateniese, Blundo, De Santis, Stinson (bib0005) 1996; 129
Shyu (bib0095) 2009; 42
Chen, Tsao (bib0035) 2009; 42
Verheul, Van Tilborg (bib0105) 1997; 11
Kafri, Keren (bib0065) 1987; 12
Lee, Chen (bib0070) 2012; 92
Shyu (10.1016/j.jss.2011.12.041_bib0090) 2007; 40
Tsai (10.1016/j.jss.2011.12.041_bib0100) 2007; 40
Verheul (10.1016/j.jss.2011.12.041_bib0105) 1997; 11
Lee (10.1016/j.jss.2011.12.041_bib0070) 2012; 92
Ateniese (10.1016/j.jss.2011.12.041_bib0010) 2001; 250
Chen (10.1016/j.jss.2011.12.041_bib0040) 2011; 84
Ateniese (10.1016/j.jss.2011.12.041_bib0005) 1996; 129
Naor (10.1016/j.jss.2011.12.041_bib0075) 1995; 950
Shyu (10.1016/j.jss.2011.12.041_bib0085) 2006; 39
Kafri (10.1016/j.jss.2011.12.041_bib0065) 1987; 12
Blundo (10.1016/j.jss.2011.12.041_bib0025) 1999; 12
Horng (10.1016/j.jss.2011.12.041_bib0050) 2006; 38
Hu (10.1016/j.jss.2011.12.041_bib0060) 2007; 16
Blundo (10.1016/j.jss.2011.12.041_bib0020) 2000; 75
10.1016/j.jss.2011.12.041_bib0110
10.1016/j.jss.2011.12.041_bib0015
Chang (10.1016/j.jss.2011.12.041_bib0030) 2009; 92
Hou (10.1016/j.jss.2011.12.041_bib0055) 2003; 36
Chen (10.1016/j.jss.2011.12.041_bib0035) 2009; 42
Shamir (10.1016/j.jss.2011.12.041_bib0080) 1979; 22
Shyu (10.1016/j.jss.2011.12.041_bib0095) 2009; 42
Hofmeister (10.1016/j.jss.2011.12.041_bib0045) 1997
References_xml – volume: 250
  start-page: 143
  year: 2001
  end-page: 161
  ident: bib0010
  article-title: Extended capabilities for visual cryptography
  publication-title: Theoretical Computer Science
– volume: 36
  start-page: 1619
  year: 2003
  end-page: 1629
  ident: bib0055
  article-title: Visual cryptography for color images
  publication-title: Pattern Recognition
– volume: 16
  start-page: 36
  year: 2007
  end-page: 45
  ident: bib0060
  article-title: Cheating prevention in visual cryptography
  publication-title: IEEE Transactions on Image Processing
– volume: 12
  start-page: 377
  year: 1987
  end-page: 379
  ident: bib0065
  article-title: Encryption of pictures and shapes by random grids
  publication-title: Optics Letters
– start-page: 176
  year: 1997
  end-page: 185
  ident: bib0045
  article-title: Contrast-optimal
  publication-title: Computing and Combinatorics
– volume: 11
  start-page: 179
  year: 1997
  end-page: 196
  ident: bib0105
  article-title: Constructions and properties of
  publication-title: Designs, Codes and Cryptography
– volume: 84
  start-page: 1197
  year: 2011
  end-page: 1208
  ident: bib0040
  article-title: Threshold visual secret sharing by random grids
  publication-title: Journal of Systems and Software
– volume: 22
  start-page: 612
  year: 1979
  end-page: 613
  ident: bib0080
  article-title: How to share a secret
  publication-title: Communications of the ACM
– reference: Wang, D., Li, X., Yi, F., 2008. Probabilistic (
– reference: ,
– volume: 129
  start-page: 86
  year: 1996
  end-page: 106
  ident: bib0005
  article-title: Visual cryptography for general access structures
  publication-title: Information and Computation
– reference: Blakley, G.R., 1979. Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, vol. 48, pp. 313–317.
– volume: 39
  start-page: 866
  year: 2006
  end-page: 880
  ident: bib0085
  article-title: Efficient visual secret sharing scheme for color images
  publication-title: Pattern Recognition
– volume: 38
  start-page: 219
  year: 2006
  end-page: 236
  ident: bib0050
  article-title: Cheating in visual cryptography, Designs
  publication-title: Codes and Cryptography
– volume: 42
  start-page: 1582
  year: 2009
  end-page: 1596
  ident: bib0095
  article-title: Image encryption by multiple random grids
  publication-title: Pattern Recognition
– volume: 42
  start-page: 2203
  year: 2009
  end-page: 2217
  ident: bib0035
  article-title: Visual secret sharing by random grids revisited
  publication-title: Pattern Recognition
– volume: 40
  start-page: 1014
  year: 2007
  end-page: 1031
  ident: bib0090
  article-title: Image encryption by random grids
  publication-title: Pattern Recognition
– volume: 950
  start-page: 1
  year: 1995
  end-page: 12
  ident: bib0075
  article-title: Visual cryptography
  publication-title: Lecture Notes in Computer Science
– volume: 75
  start-page: 255
  year: 2000
  end-page: 259
  ident: bib0020
  article-title: Visual cryptography for grey level images
  publication-title: Information Processing Letters
– reference: ) visual secret sharing scheme for grayscale images. In: Information Security and Cryptology, Springer, pp. 192–200.
– volume: 12
  start-page: 261
  year: 1999
  end-page: 289
  ident: bib0025
  article-title: On the contrast in visual cryptography schemes
  publication-title: Journal of Cryptology
– volume: 92
  start-page: 27
  year: 2009
  end-page: 42
  ident: bib0030
  article-title: Preventing cheating in computational visual cryptography
  publication-title: Fundamenta Informaticae
– volume: 92
  start-page: 727
  year: 2012
  end-page: 736
  ident: bib0070
  article-title: Insight into collusion attacks in random-grid-based visual secret sharing
  publication-title: Signal Processing
– volume: 40
  start-page: 2356
  year: 2007
  end-page: 2366
  ident: bib0100
  article-title: A cheating prevention scheme for binary visual cryptography with homogeneous secret images
  publication-title: Pattern Recognition
– volume: 950
  start-page: 1
  year: 1995
  ident: 10.1016/j.jss.2011.12.041_bib0075
  article-title: Visual cryptography
  publication-title: Lecture Notes in Computer Science
  doi: 10.1007/BFb0053419
– ident: 10.1016/j.jss.2011.12.041_bib0110
  doi: 10.1007/978-3-540-79499-8_16
– ident: 10.1016/j.jss.2011.12.041_bib0015
  doi: 10.1109/MARK.1979.8817296
– volume: 38
  start-page: 219
  year: 2006
  ident: 10.1016/j.jss.2011.12.041_bib0050
  article-title: Cheating in visual cryptography, Designs
  publication-title: Codes and Cryptography
  doi: 10.1007/s10623-005-6342-0
– volume: 92
  start-page: 27
  year: 2009
  ident: 10.1016/j.jss.2011.12.041_bib0030
  article-title: Preventing cheating in computational visual cryptography
  publication-title: Fundamenta Informaticae
  doi: 10.3233/FI-2009-0064
– volume: 92
  start-page: 727
  year: 2012
  ident: 10.1016/j.jss.2011.12.041_bib0070
  article-title: Insight into collusion attacks in random-grid-based visual secret sharing
  publication-title: Signal Processing
  doi: 10.1016/j.sigpro.2011.09.015
– volume: 40
  start-page: 2356
  year: 2007
  ident: 10.1016/j.jss.2011.12.041_bib0100
  article-title: A cheating prevention scheme for binary visual cryptography with homogeneous secret images
  publication-title: Pattern Recognition
  doi: 10.1016/j.patcog.2007.01.013
– volume: 11
  start-page: 179
  year: 1997
  ident: 10.1016/j.jss.2011.12.041_bib0105
  article-title: Constructions and properties of k out of n visual secret sharing schemes
  publication-title: Designs, Codes and Cryptography
  doi: 10.1023/A:1008280705142
– volume: 42
  start-page: 1582
  year: 2009
  ident: 10.1016/j.jss.2011.12.041_bib0095
  article-title: Image encryption by multiple random grids
  publication-title: Pattern Recognition
  doi: 10.1016/j.patcog.2008.08.023
– volume: 39
  start-page: 866
  year: 2006
  ident: 10.1016/j.jss.2011.12.041_bib0085
  article-title: Efficient visual secret sharing scheme for color images
  publication-title: Pattern Recognition
  doi: 10.1016/j.patcog.2005.06.010
– volume: 129
  start-page: 86
  year: 1996
  ident: 10.1016/j.jss.2011.12.041_bib0005
  article-title: Visual cryptography for general access structures
  publication-title: Information and Computation
  doi: 10.1006/inco.1996.0076
– volume: 16
  start-page: 36
  year: 2007
  ident: 10.1016/j.jss.2011.12.041_bib0060
  article-title: Cheating prevention in visual cryptography
  publication-title: IEEE Transactions on Image Processing
  doi: 10.1109/TIP.2006.884916
– volume: 40
  start-page: 1014
  year: 2007
  ident: 10.1016/j.jss.2011.12.041_bib0090
  article-title: Image encryption by random grids
  publication-title: Pattern Recognition
  doi: 10.1016/j.patcog.2006.02.025
– volume: 12
  start-page: 377
  year: 1987
  ident: 10.1016/j.jss.2011.12.041_bib0065
  article-title: Encryption of pictures and shapes by random grids
  publication-title: Optics Letters
  doi: 10.1364/OL.12.000377
– volume: 22
  start-page: 612
  year: 1979
  ident: 10.1016/j.jss.2011.12.041_bib0080
  article-title: How to share a secret
  publication-title: Communications of the ACM
  doi: 10.1145/359168.359176
– volume: 84
  start-page: 1197
  year: 2011
  ident: 10.1016/j.jss.2011.12.041_bib0040
  article-title: Threshold visual secret sharing by random grids
  publication-title: Journal of Systems and Software
  doi: 10.1016/j.jss.2011.02.023
– volume: 12
  start-page: 261
  year: 1999
  ident: 10.1016/j.jss.2011.12.041_bib0025
  article-title: On the contrast in visual cryptography schemes
  publication-title: Journal of Cryptology
  doi: 10.1007/s001459900057
– volume: 36
  start-page: 1619
  year: 2003
  ident: 10.1016/j.jss.2011.12.041_bib0055
  article-title: Visual cryptography for color images
  publication-title: Pattern Recognition
  doi: 10.1016/S0031-3203(02)00258-3
– start-page: 176
  year: 1997
  ident: 10.1016/j.jss.2011.12.041_bib0045
  article-title: Contrast-optimal k out of n secret sharing schemes in visual cryptography
  publication-title: Computing and Combinatorics
  doi: 10.1007/BFb0045084
– volume: 250
  start-page: 143
  year: 2001
  ident: 10.1016/j.jss.2011.12.041_bib0010
  article-title: Extended capabilities for visual cryptography
  publication-title: Theoretical Computer Science
  doi: 10.1016/S0304-3975(99)00127-9
– volume: 75
  start-page: 255
  year: 2000
  ident: 10.1016/j.jss.2011.12.041_bib0020
  article-title: Visual cryptography for grey level images
  publication-title: Information Processing Letters
  doi: 10.1016/S0020-0190(00)00108-3
– volume: 42
  start-page: 2203
  year: 2009
  ident: 10.1016/j.jss.2011.12.041_bib0035
  article-title: Visual secret sharing by random grids revisited
  publication-title: Pattern Recognition
  doi: 10.1016/j.patcog.2008.11.015
SSID ssj0007202
Score 2.190282
Snippet ► We propose a RG-based VSS for general access structures. ► Pixel expansion problem is solve in the proposed scheme. ► Complex sharing strategy can be...
Conventional visual secret sharing (VSS) encodes a secret image into shares which are m times as big as the secrets. m is called pixel expansion. Random grid...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1119
SubjectTerms Access structure
Algorithms
Cheating
Cheating immune
Computer programs
Data encryption
Image processing systems
Pixels
Random grid
Software
Strategy
Studies
Systems development
Visual
Visual secret sharing
Title Random grid-based visual secret sharing for general access structures with cheat-preventing ability
URI https://dx.doi.org/10.1016/j.jss.2011.12.041
https://www.proquest.com/docview/925769224
https://www.proquest.com/docview/1022880089
Volume 85
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  customDbUrl:
  eissn: 1873-1228
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0007202
  issn: 0164-1212
  databaseCode: GBLVA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier ScienceDirect
  customDbUrl:
  eissn: 1873-1228
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0007202
  issn: 0164-1212
  databaseCode: .~1
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection
  customDbUrl:
  eissn: 1873-1228
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0007202
  issn: 0164-1212
  databaseCode: ACRLP
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals [SCFCJ]
  customDbUrl:
  eissn: 1873-1228
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0007202
  issn: 0164-1212
  databaseCode: AIKHN
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 1873-1228
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0007202
  issn: 0164-1212
  databaseCode: AKRWK
  dateStart: 19950101
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA9DL178Fud0RPAkxK1ZsqxHEcdU3MEP8BbSJJ0T7YbdBC_-7b7XpoqCO3hsm0fKS95nXn6PkCOnut6nsWTe-BQCFJWwpG09A1uL2CwOjBamBq6H3cG9uHyQDzVyVt2FwbLKoPtLnV5o6_CmFbjZmo7HrVsEh4o4QpTBzuQc43YhFHYxOPn4LvNQvKg7xMEMR1cnm0WN11OelyiemBEU0V-26ZeWLkxPf52sBp-Rnpa_tUFqPtska1U_BhrEc4vYG5O5yQsdvY4dQ_Pk6Ns4nwNpjs7hjOaPBtN4FBxVOirxpqkpOibSEkd2DsE3xdQstaik2TQAPAFNief9vk3u--d3ZwMWmigw25Fqxgy4YMoL7yMbx6kUSSKUMJ53QTCNELaHLpWV0nUstyYSqY-Fir0Esx8l0rnODlnKJpnfJZSnSsqON0lxdqkckLu27MEEXCSR6tVJu2KftgFhHBtdPOuqlOxJA8c1clxHXAPH6-T4i2RawmssGiyqNdE_9ogG9b-IrFGtnw4CmusYA60Y_Jc6Ofz6CpKFxyUm85N5rjEWBu3W7sV7_5u4QVbgiZflkftkCRbSH4ALM0uaxR5tkuXTi6vB8BNMEPBF
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA6iB734FuszgichtpsmTfcoYqnPg7bgLWSTrFZ0W9xW8OJvd2Y3qyjYg9dNhiyTzDOTbwg5dKrlfRpL5o1PIUBRCUsa1jOwtYjN4sBoYWrg-qbV7YuLe3k_Q06rtzBYVhl0f6nTC20dvtQDN-ujwaB-h-BQEUeIMjiZnEPcPickVxiBHX9813koXhQe4myG06urzaLI6ynPSxhPTAmK6C_j9EtNF7ans0wWg9NIT8r_WiEzPlslS1VDBhrkc43YW5O54Qt9eB04hvbJ0bdBPgHSHL3DMc0fDebxKHiq9KEEnKamaJlISyDZCUTfFHOz1KKWZqOA8AQ0JaD3-zrpd856p10Wuigw25RqzAz4YMoL7yMbx6kUSSKUMJ63QDKNELaNPpWV0jUttyYSqY-Fir0Eux8l0rnmBpnNhpnfJJSnSsqmN0lxeakckLuGbMMCXCSRatdIo2KftgFiHDtdPOuqluxJA8c1clxHXAPHa-Toi2RU4mtMmyyqPdE_DokG_T-NbLvaPx0kNNcxRloxODA1cvA1CqKF9yUm88NJrjEYBvXWaMdb_1t4n8x3e9dX-ur85nKbLMAIL2sld8gsbKrfBX9mnOwV5_UT4c_x2g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Random+grid-based+visual+secret+sharing+for+general+access+structures+with+cheat-preventing+ability&rft.jtitle=The+Journal+of+systems+and+software&rft.au=Wu%2C+Xiaotian&rft.au=Sun%2C+Wei&rft.date=2012-05-01&rft.issn=0164-1212&rft.volume=85&rft.issue=5&rft.spage=1119&rft.epage=1134&rft_id=info:doi/10.1016%2Fj.jss.2011.12.041&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jss_2011_12_041
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0164-1212&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0164-1212&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0164-1212&client=summon