EVCS-DAS: Evolving Visual Cryptography Schemes for Dynamic Access Structures
| aut.relation.journal | ACM Transactions on Multimedia Computing, Communications, and Applications | |
| dc.contributor.author | Wu, Xiaotian | |
| dc.contributor.author | Feng, Xinjie | |
| dc.contributor.author | Chen, Bing | |
| dc.contributor.author | Yang, Ching-Nung | |
| dc.contributor.author | Peng, Qing-Yu | |
| dc.contributor.author | Yan, Wei Qi | |
| dc.date.accessioned | 2025-01-07T21:41:28Z | |
| dc.date.available | 2025-01-07T21:41:28Z | |
| dc.date.issued | 2024-12-14 | |
| dc.description.abstract | A systematic investigation of evolving visual cryptography scheme (EVCS) is carried out in this paper. The evolving scheme, denoted as (k, ∞), differs from the (k, n) threshold in that it permits an arbitrary and perhaps unlimited number of participants. More importantly, the access structure can be updated dynamically by adding new users. First of all, a preliminary implementation strategy for the (2, ∞) EVCS is introduced. Then, by employing the (2, 2) VCS recursively with the (2, ∞) EVCS, a (k, ∞) EVCS is created. In order to enhance the performance, an improved scheme is constructed based on the multi-secret VCS (MVCS) and a series of EVCS schemes with thresholds of (1, ∞), · · · , (k − 1, ∞). Moreover, Boolean XOR operation is adopted for secret recovery to further improve the visual quality. To facilitate the XOR decryption, a novel access structure partition algorithm is presented. Additionally, the proposed partition method can successfully solve the security issue in existing multi-secret XOR-based VCS (MXVCS). By integrating the more secure MXVCS into the improved scheme, XOR decryption is provided. The two proposed methods are shown to be effective and advantageous through extensive experiments and comparisons. | |
| dc.identifier.citation | ACM Transactions on Multimedia Computing, Communications, and Applications, ISSN: 1551-6857 (Print); 1551-6865 (Online), Association for Computing Machinery (ACM). doi: 10.1145/3708547 | |
| dc.identifier.doi | 10.1145/3708547 | |
| dc.identifier.issn | 1551-6857 | |
| dc.identifier.issn | 1551-6865 | |
| dc.identifier.uri | http://hdl.handle.net/10292/18486 | |
| dc.language | en | |
| dc.publisher | Association for Computing Machinery (ACM) | |
| dc.relation.uri | https://dl.acm.org/doi/10.1145/3708547 | |
| dc.rights | © 2024 Copyright held by the owner/author(s). Free access. | |
| dc.rights.accessrights | OpenAccess | |
| dc.subject | 46 Information and Computing Sciences | |
| dc.subject | 4604 Cybersecurity and Privacy | |
| dc.subject | 0803 Computer Software | |
| dc.subject | 0805 Distributed Computing | |
| dc.subject | 0806 Information Systems | |
| dc.subject | Artificial Intelligence & Image Processing | |
| dc.subject | 4603 Computer vision and multimedia computation | |
| dc.subject | 4606 Distributed computing and systems software | |
| dc.subject | 4607 Graphics, augmented reality and games | |
| dc.title | EVCS-DAS: Evolving Visual Cryptography Schemes for Dynamic Access Structures | |
| dc.type | Journal Article | |
| pubs.elements-id | 582667 |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 3708547(WUXT).pdf
- Size:
- 22.48 MB
- Format:
- Adobe Portable Document Format
- Description:
- Journal article
