Experimental Results

  • Authorization --- Demo, source

  • (2,2) access scheme --- Demo, source

  • Halftoning and Restoration --- Demo, source

  • General access scheme


  • Authorization

    This figure shows an experiment for visual authorization. In this experiment, the size of authorization set is 3, shown in (a) to (c). The graytone versions of the key-share and user-share are shown in (d) and (e), respectively. The produced key-share is shown in (f), and three binary user-shares, (g) to (i), to take account of the three authorities defined in the authorization set. One can see that, except carefully examining the pixel distributions of these images, these images are visually indistinguishable. However, the superposed images of these key-shares with the key-share are quite different, as shown in (j) to (l).


    TOP


    (2,2) access schemes of visual cryptography

    1. Plain Shares

    S1 and S2 are plain images. Superposing S1 and S2 will reveal the secret information (S1+S2). The image shown in S1+S2 is the halftone version of Target image.


    2.Meaningful Shares

    S1 and S2 are meaningful images. Superposing S1 and S2 will reveal the secret information (S1+S2). The image shown in S1+S2 is the halftone version of Target image.


    TOP


    general access schemes of visual cryptography

  • Stacking any combination of shares forms the images with the same meaning, i.e., they differ only on lightness.

  • This differs from above one only on the assignment of stacked images.

  • S1,S2 and S3 look similar. When stacking with S4, different images appear.

  • This picture shows the application with one forbidden subset.

    TOP