Journal of System Simulation ›› 2016, Vol. 28 ›› Issue (6): 1439-1444.

Previous Articles     Next Articles

Perfect Recovery (2,n) Color Visual Cryptography Scheme

Zhang Xianhuan1, Fu Zhengxin1, Ouyang Dan2, Yu Bin1   

  1. 1. Information Engineering University, Zhengzhou 450000, China;
    2. Institute of Electronic Technology, Beijing 100089, China
  • Received:2015-05-27 Revised:2015-07-28 Online:2016-06-08 Published:2020-06-08

Abstract: Based on XOR operation and combining the characteristic of computer display technology, a perfect recovery (2,n) color visual cryptography scheme was proposed. Sharing algorithm of color secret image was designed on the basis of constructing row vectors${{V}_{1}},{{V}_{2}},\cdots ,{{V}_{n}}$. Through computing shares by XOR operation and dealing with recovery image, the secret image was recovered. The experimental results show that the scheme on the basis of keeping the simplicity in the reconstruction phase of visual cryptography can realize the secret image perfect recovery with low pixel expansion for price. Each participant only needs to carry a share which reduces the difficulty of share management.

Key words: visual cryptography, color visual cryptography, (2, n), XOR operation, perfect recovery

CLC Number: