Construction of (4,8)-schemes of visual cryptography on the base of a class of linear hash functions
In the work, with the use of visual cryptography, a (4, 8)-scheme is constructed for sharing secret, which is a black and white image. To construct the (4,8)-scheme, the (4, 4)-scheme of visual cryptography and a class of linear hash functions are used. It is shown that using this class makes it possible to build a secure scheme with an acceptable relative contrast of the recovered secret black and white image.
Download file
Counter downloads: 167
Keywords
визуальная криптография, линейные хэш-функции, visual cryptography, linear hash functionsAuthors
Name | Organization | |
Zorina N. A. | South Federal University | bodlery@gmail.com |
Kosolapov Y. V. | South Federal University | itaim@mail.ru |
References
Naor M. and Shamir A. Visual cryptography // LNCS. 1994. V. 950. P. 1-12.
Carter J. L. and Wegman M. N. Universal classes of hash functions // J. Computer System Sciences. 1979. V. 18. P. 143-154.
Lakshmanan R. and Arumugam S. Construction of a (k,n)-visual cryptography scheme // Designs, Codes and Cryptography. 2017. V.82. No.3. P. 629-645.
