Proceedings of the 2015 International Conference on Electrical, Computer Engineering and Electronics

A K out of K+1 Visual Cryptography Scheme

Authors
Benlan Liu, Shundong Li, Daoshun Wang
Corresponding Author
Benlan Liu
Available Online June 2015.
DOI
https://doi.org/10.2991/icecee-15.2015.308How to use a DOI?
Keywords
visual cryptography; visual secret sharing scheme; basic matrices
Abstract
Naor and Shamir proposed an optimal (k, k visual cryptography scheme (VCS). Droste extended the (k, k) scheme to (k, n) scheme. Based on properties of 0 and 1’s permutations of basic matrices, we use basic matrices of the (k, k) scheme to constrict basic matrices of (k, k+1) scheme.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
Part of series
Advances in Computer Science Research
Publication Date
June 2015
ISBN
978-94-62520-81-3
ISSN
2352-538X
DOI
https://doi.org/10.2991/icecee-15.2015.308How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - Benlan Liu
AU  - Shundong Li
AU  - Daoshun Wang
PY  - 2015/06
DA  - 2015/06
TI  - A K out of K+1 Visual Cryptography Scheme
PB  - Atlantis Press
SP  - 1636
EP  - 1641
SN  - 2352-538X
UR  - https://doi.org/10.2991/icecee-15.2015.308
DO  - https://doi.org/10.2991/icecee-15.2015.308
ID  - Liu2015/06
ER  -