Visual Cryptography Schemes with Optimal Pixel Expansion

Similar documents
Visual cryptography schemes with optimal pixel expansion

A new visual cryptography scheme for STS based access structures

Optimal XOR based (2,n)-Visual Cryptography Schemes

Cheating Human Vision in Visual Secret Sharing

Encrypting More Information in Visual Cryptography Scheme

Efficient Constructions for t-(k, n) -Random Grid Visual Cryptographic Schemes

Secret Sharing. Qi Chen. December 14, 2015

Characterizing Ideal Weighted Threshold Secret Sharing

Characterizing Ideal Weighted Threshold Secret Sharing

Optimal Linear Secret Sharing Schemes for Graph Access Structures on Six Participants

Cube attack in finite fields of higher order

Lecture Introduction. 2 Linear codes. CS CTT Current Topics in Theoretical CS Oct 4, 2012

Zigzag Codes: MDS Array Codes with Optimal Rebuilding

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets

FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES

Characterizing Ideal Weighted Threshold Secret Sharing

Decomposing Bent Functions

Hierarchical Simple Games: Weightedness and Structural Characterization

Some Bounds and a Construction for Secure Broadcast Encryption

New Minimal Weight Representations for Left-to-Right Window Methods

0 Sets and Induction. Sets

An average case analysis of a dierential attack. on a class of SP-networks. Distributed Systems Technology Centre, and

Mathematics Course 111: Algebra I Part I: Algebraic Structures, Sets and Permutations

ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES

Detection of Cheaters in Non-interactive Polynomial Evaluation

Lecture 18 - Secret Sharing, Visual Cryptography, Distributed Signatures

Basic counting techniques. Periklis A. Papakonstantinou Rutgers Business School

Therefore, in a secret sharing scheme ± with access structure, given a secret value k 2 K and some random election, a special participant D =2 P, call

Division Property: a New Attack Against Block Ciphers

Weighted Threshold Secret Sharing Based on the Chinese Remainder Theorem

Strongly chordal and chordal bipartite graphs are sandwich monotone

On Secret Sharing Schemes, Matroids and Polymatroids

Min-Rank Conjecture for Log-Depth Circuits

Secret Sharing for General Access Structures

An Optimal Lower Bound for Nonregular Languages

Statistical and Linear Independence of Binary Random Variables

Ranks of Hadamard Matrices and Equivalence of Sylvester Hadamard and Pseudo-Noise Matrices

Lecture Notes on Secret Sharing

Secret sharing schemes

On Linear Secret Sharing for Connectivity in Directed Graphs

Economics 204 Fall 2011 Problem Set 1 Suggested Solutions

Codes for Partially Stuck-at Memory Cells

Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary

Improved Zero-sum Distinguisher for Full Round Keccak-f Permutation

Lecture 4: Counting, Pigeonhole Principle, Permutations, Combinations Lecturer: Lale Özkahya

Cell-Probe Lower Bounds for Prefix Sums and Matching Brackets

Problem 1: Suppose A, B, C and D are finite sets such that A B = C D and C = D. Prove or disprove: A = B.

Shortest paths with negative lengths

Compartmented Threshold RSA Based on the Chinese Remainder Theorem

We want to show P (n) is true for all integers

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights

The decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t

Graph coloring, perfect graphs

Efficient Conversion of Secret-shared Values Between Different Fields

The Strong Largeur d Arborescence

Generalized hyper-bent functions over GF(p)

11 Minimal Distance and the Parity Check Matrix

Cone Avoidance of Some Turing Degrees

Math 3121, A Summary of Sections 0,1,2,4,5,6,7,8,9

Coloring Vertices and Edges of a Path by Nonempty Subsets of a Set

Secret-sharing with a class of ternary codes

Containment restrictions

FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES

Characterization of 2 n -Periodic Binary Sequences with Fixed 2-error or 3-error Linear Complexity

Additional Constructions to Solve the Generalized Russian Cards Problem using Combinatorial Designs

CS632 Notes on Relational Query Languages I

Lecture Notes 1 Basic Concepts of Mathematics MATH 352

LEVEL MATRICES G. SEELINGER, P. SISSOKHO, L. SPENCE, AND C. VANDEN EYNDEN

Pigeonhole Principle and Ramsey Theory

Some statistics on permutations avoiding generalized patterns

Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming

Notes for Math 290 using Introduction to Mathematical Proofs by Charles E. Roberts, Jr.

Ideal Hierarchical Secret Sharing Schemes

Counting Functions for the k-error Linear Complexity of 2 n -Periodic Binary Sequences

Efficient Approximation for Restricted Biclique Cover Problems

Benes and Butterfly schemes revisited

Notes on Alekhnovich s cryptosystems

Linear Classification: Linear Programming

New Inequalities for q-ary Constant-Weight Codes

AES side channel attacks protection using random isomorphisms

Show Your Work! Point values are in square brackets. There are 35 points possible. Some facts about sets are on the last page.

TC08 / 6. Hadamard codes SX

arxiv: v1 [cs.cr] 1 May 2012

Counting Functions for the k-error Linear Complexity of 2 n -Periodic Binary Sequences

Linear Secret-Sharing Schemes for Forbidden Graph Access Structures

Constructions of digital nets using global function fields

CSE 202 Homework 4 Matthias Springer, A

Towards the use of Simplification Rules in Intuitionistic Tableaux

DISTINGUISHING PARTITIONS AND ASYMMETRIC UNIFORM HYPERGRAPHS

BOOLEAN ALGEBRA INTRODUCTION SUBSETS

Department of Computer Science University at Albany, State University of New York Solutions to Sample Discrete Mathematics Examination II (Fall 2007)

Existence and Non-existence Results for Strong External Difference Families

Relations Graphical View

M17 MAT25-21 HOMEWORK 6

Coloring Vertices and Edges of a Path by Nonempty Subsets of a Set

VC-DENSITY FOR TREES

Lecture 8: Equivalence Relations

Chapter 1 The Real Numbers

Compartmented Secret Sharing Based on the Chinese Remainder Theorem

download instant at

Transcription:

Visual Cryptography Schemes with Optimal Pixel Expansion Carlo Blundo, Stelvio Cimato and Alfredo De Santis Dipartimento di Informatica ed Applicazioni Università degli Studi di Salerno, 808, Baronissi (SA), Italy Dipartimento di Tecnologie dell Informazione Università degli Studi di Milano, 603 Crema, Italy Abstract A visual cryptography scheme encodes a black & white secret image into n shadow images called shares which are distributed to the n participants. Such shares are such that only qualified subsets of participants can visually recover the secret image. Usually, the reconstructed image will be darker than the background of the image itself. In this paper we consider visual cryptography schemes satisfying the model introduced by Tzeng and Hu (Designs, Codes and Cryptography, Vol. 7, No. 3, pp. 07 7, 00). In such a model the recovered secret image can be darker or lighter than the background. We prove a lower bound on the pixel expansion of the scheme and, for (, n)-threshold visual cryptography schemes, we provide schemes achieving the bound. Our schemes improve on the ones proposed by Tzeng and Hu. Keywords: Visual cryptography, Pixel expansion. Introduction A visual cryptography scheme for a set P of n participants is a method to encode a secret black and white image SI into n shadow images called shares, where each participant in P receives one share. Certain qualified subsets of participants can visually recover the secret image, but other, forbidden, sets of participants have no information (in an information-theoretic sense) on SI. A visual recovery for a set X P consists of xeroxing the shares given to the participants in X onto transparencies, and then stacking them. The participants in a qualified set X will be able to see the secret image without any knowledge of cryptography and without performing any cryptographic computation.

This cryptographic paradigm was introduced by Naor and Shamir in their seminal paper [3]. They analyzed the case of (k, n)-threshold visual cryptography schemes, in which the secret image is visible if any k or more transparencies are stacked together. If fewer than k transparencies are stacked together, then the resulting image will be indistinguishable from random noise. More generally, any set of k participants can analyze their collection of shares by any means, but they will obtain no information about the secret image. In order to implement a visual cryptography scheme, each pixel of the original image is encoded into n version called shares, one for each transparency. Each share is composed of m black and white subpixels. When we superimpose two white subpixels we obtain a white subpixel; while, superimposing one black subpixel to any other subpixel we get a black subpixel. Thus, the grey level of the combined share obtained by stacking some transparencies is proportional to the number of black subpixels appearing in it. This grey level is interpreted by the visual system of the users as black or as white in according with some rule of contrast. In the model introduced by Naor and Shamir the grey level of a reconstructed black pixel will be greater than the grey level of a reconstructed white one. In other words, the reconstructed image will be darker than the background of the image itself. In this paper we consider visual cryptography schemes satisfying the model introduced by Tzeng and Hu in []. In such a model the recovered secret image can be darker or lighter than the background. The best way to understand such a new model is by resorting to an example. We want to realize a (, 3)-threshold visual cryptography schemes. Hence, there are three participants, that is P = {,, 3}, and any two of them can recover the secret image. We want to encode the secret image TCS. For this example, the visual cryptography scheme satisfying the model in [] is described in (5). The original image and the three shares generated by are as follows. Figure : The original image and the shares of a (, 3)-threshold VCS Three of them look like random patterns and, indeed, no individual share provides any information, even to an infinitely powerful computer, on the original image. If we superimpose the transparencies associated to participants

and and to participants and 3, respectively, we get the following result. Figure : Images reconstructed by participants and and and 3, respectively In this paper we restrict our attention to (, n)-threshold visual cryptography schemes. We prove a lower bound on the pixel expansion of the scheme and we provide visual cryptography schemes achieving the bound. Our schemes improve, with respect to the pixel expansion, on the ones presented in []. Model and Notation Let P = {,..., n} be a set of elements called participants, and let P denote the set of all subsets of P. Let Γ Qual P and Γ Forb P, where Γ Qual Γ Forb =. We refer to members of Γ Qual as qualified sets and we call members of Γ Forb forbidden sets. The pair (Γ Qual, Γ Forb ) is called the access structure of the scheme. Define Γ 0 to consist of all the minimal qualified sets: Γ 0 = {A Γ Qual : A Γ Qual for all A A}. A qualified set X that does not belong to Γ 0, i.e., X Γ Qual \Γ 0, is referred to as not-minimal qualified set. A (k, n)-threshold VCS is a visual cryptography scheme for the access structure with basis Γ 0 = {B P : B = k}. We assume that the image consists of a collection of black and white pixels. Each pixel appears in n versions called shares, one for each transparency. Each share is a collection of m black and white subpixels. The resulting structure can be described by an n m Boolean matrix S = [s ij ] where s ij = iff the j-th subpixel in the i-th transparency is black. Therefore the grey level of the combined share, obtained by stacking the transparencies i,..., i s, is proportional to the Hamming weight w(v ) of the m-vector V = OR(r i,..., r is ) where r i,..., r is are the rows of S associated with the transparencies we stack. This grey level is interpreted by the visual system of the users as black or as white in according with some rule of contrast. The conventional definition [] for visual cryptography schemes is as follows. Definition. Let (Γ Qual, Γ Forb ) be an access structure on a set of n participants. Two collections (multisets) of n m boolean matrices C 0 and C constitute a visual cryptography scheme (Γ Qual, Γ Forb, m)-vcs if there exist the value α(m) and the set {(X, t X )} X ΓQual satisfying:. Any (qualified) set X = {i, i,..., i p } Γ Qual can recover the shared image by stacking their transparencies. 3

Formally, for any M C 0, the or V of rows i, i,..., i p satisfies w(v ) t X α(m) m; whereas, for any M C it results that w(v ) t X.. Any (forbidden) set X = {i, i,..., i p } Γ Forb has no information on the shared image. Formally, the two collections of p m matrices D t, with t {0, }, obtained by restricting each n m matrix in C t to rows i, i,..., i p are indistinguishable in the sense that they contain the same matrices with the same frequencies. The first property is related to the contrast of the image. It states that when a qualified set of users stack their transparencies they can correctly recover the shared image (i.e., the revealed image is darker than the background, in other words, the grey level of a reconstructed black pixel is bigger than the grey level of a reconstructed withe pixel). The value α(m) is called relative difference, the number α(m) m is referred to as the contrast of the image, the set {(X, t X )} X ΓQual is called the set of thresholds, and t X is the threshold associated to X Γ Qual. We want the contrast to be as large as possible and at least one, that is, α(m) m. The second property is called security, since it implies that, even by inspecting all their shares, a forbidden set of participants cannot gain any information in deciding whether the shared pixel was white or black. In the following we recall the definition of visual cryptography scheme provided in []. The main difference between the such definition of VCS and the traditional one is that the property of contrast of the reconstructed image is changed as the revealed image can be darker or lighter than the background (i.e., some qualified sets recover the original image, while other qualified sets recover the negative of the image itself). Moreover, as also done in [], we assume that only the sets in Γ 0 can recover the shared image by stacking their transparencies. If a set X is a not-minimal qualified (i.e., it belongs to Γ Qual \Γ 0 ), then we assume that the participants in X, stacking their transparencies, cannot distinguish a white pixel from a black one. This is formalized by the next definition []. Definition. Let (Γ Qual, Γ Forb ) be an access structure on a set of n participants. Two collections (multisets) of n m boolean matrices C 0 and C constitute a visual cryptography scheme (Γ Qual, Γ Forb, m)-vcs if there exist the value α(m) and the set {(X, t X )} X ΓQual satisfying:. Any minimal qualified set X = {i, i,..., i p } Γ 0 can recover the shared image by stacking their transparencies. Formally, for any M C 0, the or V of rows i, i,..., i p satisfies w(v ) = t X ; whereas, either, for any M C, it results that w(v ) t X + α(m) m or, for any M C, it results that w(v ) t X α(m) m.. Any (forbidden) set X = {i, i,..., i p } Γ Forb has no information on the shared image.

Formally, the two collections of p m matrices D t, with t {0, }, obtained by restricting each n m matrix in C t to rows i, i,..., i p are indistinguishable in the sense that they contain the same matrices with the same frequencies. 3. Any not minimal qualified set X = {i, i,..., i p } Γ Qual \Γ 0, by stacking their transparencies, has no information on the shared image. Formally, the two collections of m vectors V t, with t {0, }, obtained by OR-ing the rows i, i,..., i p of each matrix in C t are indistinguishable in the sense that they contain the same vectors with the same frequencies. We see that Condition of Definitions. and. are different. According to Definition. the revealed image is darker than the background; while, according to Definition. the revealed image can be darker or lighter than the background. Moreover, in this model we rule out the possibility that by stacking all the transparencies of the participants in X Γ Qual \Γ 0, some information about the secret image is revealed. However, notice that, if a set of participants X is a superset of a minimal qualified set X and they know the form of the access structure (Γ Qual, Γ Forb ), then, they can recover the shared image by considering only the shares of the set X. Moreover, when the participants in X do not know the access structure they belong to, they can always recover the original image. Indeed, by inspecting their transparencies all together they can distinguish whether the shares come from a matrix in C 0 or a matrix in C. In view of the above observations we make few considerations about the structure of Γ Qual and Γ Forb. It is clear that any subset of a forbidden subset is forbidden, so Γ Forb is necessarily monotone decreasing. Hence, no superset of a qualified subset is forbidden. Finally, w.l.o.g., we can assume that Γ Qual is monotone increasing that is Γ Qual = {C P : B C for some B Γ 0 }, and we say that Γ Qual is the closure of Γ 0. All constructions in this paper are realized using two n m matrices, S 0 and S, called basis matrices satisfying the following definition. Definition.3 Let (Γ Qual, Γ Forb ) be an access structure on a set of n participants. A (Γ Qual, Γ Forb, m)-vcs with relative difference α(m) and set of thresholds {(X, t X )} X ΓQual is realized using the two n m basis matrices S 0 and S if the following two conditions hold.. If X = {i, i,..., i p } Γ 0 (i.e., if X is a minimal qualified set), then the or V of rows i, i,..., i p of S 0 satisfies w(v ) = t X ; whereas, for S it results that either w(v ) t X + α(m) m or w(v ) t X α(m) m.. If X = {i, i,..., i p } Γ Forb (i.e., if X is a forbidden set), then the two p m matrices obtained by restricting S 0 and S to rows i, i,..., i p are equal up to a columns permutation. 5

3. If X = {i, i,..., i p } Γ Qual \Γ 0, (i.e., X is a qualified set which is not minimal), then the two m vectors V 0 and V, obtained by OR-ing the rows i, i,..., i p of S 0 and S, respectively, have the same Hamming weight, that is, w(v 0 ) = w(v ). The collections C 0 and C are obtained by permuting the columns of the corresponding basis matrix (S 0 for C 0, and S for C ) in all possible ways. A visual cryptography scheme (Γ Qual, Γ Forb, m)-vcs which is optimal with respect to the pixel expansion m will be referred to as an m-optimal VCS. 3 The Structure of VCS Before to provide some useful properties of VCS, we need to set up our notation. Let M be a n m binary matrix. For X {,..., n}, let M X denote the m- vector obtained by considering the or of the rows corresponding to the indices in X; whereas M[X] denotes the X m matrix obtained from M by considering only the rows corresponding to the indices in X. If X = {r}, then instead of using M[{r}] to denote the row r of M we will use the shortened notation M[r]. For any binary vector V, with w(v ) we denote the number of zeroes in V (i.e., the complement of the Hamming weight). By abusing of notation, given two matrices A and B having the same number of rows, with A B = we denote the fact that the same column does not appear in both matrices. In this case, the matrices A and B are referred as non-redundant matrices. Finally, with A B we denote the matrix obtained by concatenating the matrices A and B. We restrict our attention to (Γ Qual, Γ Forb, m)-vcs realized by non-redundant basis matrices S 0 and S. In this case, if the access structure is not an (n, n)- threshold access structures, we will prove that Condition 3 of Definition.3 reduces to w(sx 0 ) = w(s X ) = m, for any X Γ Qual\Γ 0. We will also prove that the matrix S = S 0 S has to contain some predefined sub-matrices. The columns of such sub-matrices are referred to as unavoidable patterns. Theorem 3. In any (Γ Qual, Γ Forb, m)-vcs realized by the non-redundant basis matrices S 0 and S, for any X Γ Qual \Γ 0, it holds that w(s 0 X) = w(s X) = m. Proof. We will prove the theorem by contradiction by showing that if some set X Γ Qual \Γ 0 does not satisfy w(s 0 X ) = w(s X ) = m, then S0 S. We will consider the sets in Γ Qual \Γ 0 in non-increasing order by size. Let P = {,..., n} be the set of n participants the access structure (Γ Qual, Γ Forb ) is realized on. For i n, let Q(i) be the family of all qualified sets of size i which are not minimal, i.e., Q(i) = {X Γ Qual \Γ 0 : X = i}. Since we are considering Γ Qual monotone increasing, it results that if X Q(i), then X {j} Q(i + ) for any j P\X. Let X Q(n) (notice that there is only one set in Q(n) as we do not consider (n, n)-threshold access structures) and let Σ be a VCS for (Γ Qual, Γ Forb ) such 6

that S 0 S = and w(sx 0 ) = w(s X ) = m X < m. In this case, there exist m m X columns both in S 0 and S whose entries are all equal to zero. This implies that S 0 S which contradicts the hypothesis. Hence, in the scheme Σ we have that w(sx 0 ) = w(s X ) = m, for X Q(n). If Q(n ) =, then there do not exist qualified sets X Γ Qual \Γ 0 of cardinality n. Therefore, there is nothing to prove. If Q(n ), then, consider any set X Q(n ) and assume that w(sx 0 ) = w(s X ) = m X < m. In this case there exist m m X columns both in S 0 [X] and S [X] whose entries are equal to zero. For the sake of simplicity assume these are the first m m X columns of both S 0 [X] and S [X]. Let {i} = P\X. Since for Y = {i} X Q(n) we proved that w(sy 0 ) = w(s Y ) = m, it must be the case that S0 [i, ] = = S 0 [i, m m X ] = and that S [i, ] = = S [i, m m X ] =. Therefore, the first m m X columns of both S 0 and S are equal. This implies that S 0 S which contradicts the hypothesis of the theorem. Hence, in the scheme Σ we have that w(sx 0 ) = w(s X ) = m, for any X Q(n ), too. In general, if for some value q, we have that Q(n q) and that w(sx 0 ) = w(sx ) = m for any X Q(n q + ), then we can proceed as follows. Consider any set X Q(n q) and assume that w(sx 0 ) = w(s X ) = m X < m. In this case there exist m m X columns both in S 0 [X] and S [X] whose entries are equal to zero. For the sake of simplicity assume these are the first m m X columns of both S 0 [X] and S [X]. Since, for any i P\X, it holds that w(sy 0 ) = w(sy ) = m, where Y = {i} X Q(n q + ), then S0 [i, j] = S [i, j] =, for j m m X and i P\X. Therefore, the first m m X columns of both S 0 and S are equal as they contain a zero in position j X and a one in position i P\X. This implies that S 0 S which contradicts the hypothesis of the theorem. Thus, we can conclude that for any X Γ Qual \Γ 0, it holds that w(sx 0 ) = w(s X ) = m and the theorem is proved. The next corollary is a consequence of the above theorem. Corollary 3. For any (k, n)-threshold VCS realized by the non-redundant basis matrices S 0 and S, there is no column in S 0 S of weight less than n k. Proof. Let S = S 0 S. According to Theorem 3., for any X Γ Qual \Γ 0, it holds that w(s X ) = m. Suppose by contradiction that there is a column in S 0 S of weight t < n k. This implies that in such a column there are n t > k entries, say the first n t, all equal to zero. Hence, w(s X ) = m, where X = {,..., n t}. This contradicts w(s X ) = m, for any X Γ Qual \Γ 0. Thus, the corollary holds. The next lemma states that if there exists a VCS having basis matrices S 0 and S such that S 0 S, then we can always construct a new VCS with non-redundant basis matrices Ŝ0 and Ŝ. Lemma 3.3 If Σ is a (Γ Qual, Γ Forb, m)-vcs having contrast α(m) realized by basis matrices S 0 and S such that S 0 S, then there exists a (Γ Qual, Γ Forb, m)- VCS having contrast α( m) = α(m) m/ m realized by non-redundant basis matrices. 7

Proof. Let R = S 0 S, then the basis matrices S 0 and S are equal, up to a column permutation, to the matrices Ŝ0 R and Ŝ R, respectively. Assume that the matrix Ŝb, for b = 0,, has dimension n m. We will prove that the matrices Ŝ0 and Ŝ satisfy Definition.3. For any X Γ 0 by Condition of Definition.3, we have that w(s 0 X ) = w(ŝ0 X ) + w(r X) = t X and either w(s X ) = w(ŝ X ) + w(r X) t X + α(m) m or w(s X ) = w(ŝ X ) + w(r X) t X α(m) m. Setting t X = t X w(r X ) and α( m) = α(m) m/ m we have that w(ŝ0 X ) = t X and either w(ŝ X ) t X + α( m) m or w(ŝ X ) t X α( m) m. Therefore, the matrices Ŝ0 and Ŝ satisfy Condition of Definition.3. For any X Γ Forb, Condition of Definition.3 states that S 0 [X] is equal, up to a column permutation, to S [X]. Therefore, the matrices Ŝ0 [X] and Ŝ [X] are equal, up to a column permutation, too. Hence, the matrices Ŝ0 and Ŝ satisfy Condition of Definition.3. Finally, For any X Γ Qual \Γ 0, Condition of Definition.3 states that w(s 0 X ) = w(s X ). Since w(s0 X ) = w(ŝ0 X ) + w(r X) and w(s X ) = w(ŝ X ) + w(r X), we get that w(ŝ0 X ) = w(ŝ X ). Therefore, the matrices Ŝ0 and Ŝ satisfy Condition 3 of Definition.3. Thus, the lemma holds. In the following theorem we will prove that the matrices S 0 and S have to contain some predefined patterns which we call unavoidable patterns. More precisely, for any VCS the matrix S 0 S has to contain some fixed columns determined by Γ 0. Theorem 3. In any (Γ Qual, Γ Forb, m)-vcs realized by the basis matrices S 0 and S, for any X = {i, i,..., i p } Γ 0, either S 0 or S contains at least α(m) m columns with a 0 in the rows {i, i,..., i p } and s in the other rows. Proof. Assume that the VCS is realized by non-redundant basis matrices S 0 and S. If this is not the case, then, by applying Lemma 3.3, we can construct a new VCS whose basis matrices have empty intersection and whose pixel expansion m and contrast α( m) satisfy α( m) m = α(m) m. Consider any set of participants X = {i, i,..., i p } Γ 0. From Condition of Definition., we have that w(sx 0 ) = t X and that either w(sx ) t X + α(m) m or w(sx ) t X α(m) m. Assuming that w(sx ) t X + α(m) m, we get w(sx ) w(s0 X ) α(m) m. Therefore, the matrix S0 [X] must contain at least α(m) m columns with all entries equal to zero. Moreover, by Theorem 3., we have that w(sy 0 ) = w(s Y ) = m, for any Y such that X Y. Therefore, the matrix S 0 contains at least α(m) m columns with a 0 in the rows {i, i,..., i p } and s in the other rows. We can apply the same reasoning as above when w(sx ) t X α(m) m proving that the matrix S contains at least α(m) m columns with a 0 in the rows {i, i,..., i p } and s in the other rows. Thus, the theorem is proved. 8

From the above theorem one can easily get that in any visual cryptography scheme realized by non-redundant basis matrices (i.e., S 0 S = ), the number of columns of S 0 S is at least Γ 0 α(m) m. Therefore, since α(m) m and m has to be an integer value, we can immediately get a bound on the pixel expansion for any (Γ Qual, Γ Forb, m)-vcs as stated by the next theorem. Theorem 3.5 In any (Γ Qual, Γ Forb, m)-vcs realized by basis matrices, the pixel expansion satisfies m Γ 0 /. We give the following two examples to illustrate the definition of unavoidable patterns and the use of Theorem 3.5, when P = {,, 3, }. { } Example 3. Define Γ 0 = {, }, {, 3}, {3, }. The unavoidable patterns are: 0 0 0 0 0 0 The following basis matrices S 0 and S realize a VCS for Γ 0. 0 0 S 0 = 0 0 S = 0 0. 0 0 The unavoidable patterns 0 0 0 0 belongs to S 0 ; while, the unavoidable pattern 0 0 belongs to S. In this scheme, m = 3 and α(m) = /3. { } {, }, {, 3}, {3, }, {, }. The unavoidable pat- Example 3. Define Γ 0 = terns are: 0 0 0 0 0 0 0 0 9

The basis matrices S 0 and S realizing a VCS for Γ 0 are as follows: 0 0 S 0 = 0 0 S = 0 0. 0 0 In this scheme, m = and α(m) = /. According to Theorem 3.5 the VCS realized by S 0 and S is optimal with respect to the pixel expansion. Recall that a (k, n)-threshold VCS is a visual cryptography scheme for the access structure with basis Γ 0 = {B P : B = k}. In [3] Naor and Shamir proved that for any (n, n)-threshold VCS the pixel expansion satisfies m n. The structure of basis matrices (n, n)-threshold VCS was completely characterized in []. The proof of Theorem 7. in [] can easily be modified in order to prove that for any (n, n)-threshold VCS satisfying Definition.3 the pixel expansion is lower bounded by n, too. In the case of (k, n)-threshold access structures, with k < n, the next corollary provides a bound on m. Corollary 3.6 In any (k, n)-threshold VCS, with k < n, realized by basis matrices, the pixel expansion satisfies ( )/ n m. k In the next section we will see that above bound is tight for (, n)-threshold VCS when n mod. For the other cases we will provide stronger bounds. Optimal (, n)-threshold VCS In this section we will prove a bound on the pixel expansion of (, n)-threshold VCS, with n >, realized by basis matrices. We will show that such bound is tight by presenting (, n)-threshold VCS meeting it.. The Bound In this section we prove a lower bound on the pixel expansion stronger than the one provided by Corollary 3.6 when n is even or n 3 mod. Theorem. In any (, n)-threshold VCS, with n >, constructed using basis matrices the pixel expansion satisfies n if n 0 mod m n(n ) if n mod n n+6 if n 3 mod 0

Proof. Assume that n is even and let Σ be a (, n)-threshold VCS constructed using the basis matrices S 0 and S. Let S be the binary matrix equal to S = S 0 S. Because of Condition of Definition.3 it results that that both the number of zeroes and the number of ones in any row of S is even. According to Corollary 3. all columns in S have weight at least n. Moreover, from Theorem 3., all the ( n ) distinct columns of weight n (i.e., the unavoidable patterns) have to appear in S. Therefore, S is equal, up to a columns permutation to the matrix A B, where A is a n ( n ) matrix composed by all the distinct unavoidable patterns and B is some binary matrix whose columns have weight at least n. Notice that, for r n, we have that the number of zeroes in A[r] is equal to n which is odd. This means that, for r n, the matrix B must contain at least a column whose r-th entry is equal to zero. Since all B s columns have weight at least n, to have that in any row of A B there is an even number of zeroes, it results that the number of columns in B should be at least n/. Therefore, the number of columns in S is at least n(n )/ + n/ = n /. Hence, m n. Thus, the theorem is proved for n even. If n mod, then we can apply directly Corollary 3.6. So we are left with proving that the last inequality holds. Consider n 3 mod and let Σ be a (, n)-threshold VCS realized by the basis matrices S 0 and S. By Corollary 3.6, the pixel expansion is lower bounded by n(n )/ = (n n + )/. We will prove that there does not exist a VCS with pixel expansion equal to (n n + )/. Therefore, m should be at least (n n + )/ + = (n n + 6)/ and the theorem is proved. Assume by contradiction that Σ has pixel expansion equal to m = (n n+)/. According to Theorem 3., each of the ( n ) columns of weight n has to appear either in S 0 or in S. Therefore, since ( n ) = m, one matrix, say S 0, will contain m = (n n )/ of such columns; while, S will comprise the others m = (n n + )/. Let U 0 the sub-matrix of S 0 composed of only m distinct unavoidable patterns. Now, we prove that there exists at least an index j, with j n, such that w(u 0 [j]) (n 3)/. Assume by contradiction that w(u 0 [i]) (n )/ for all i with i n. Then, we have that the total number of zeroes in U 0 is at least n(n )/ which is a contradiction as, by construction, the total number of zeroes in U 0 is (m ) = (n n )/. Hence, there exists an index j, with j n, such w(u 0 [j]) (n 3)/. Since any row of U 0 S (the matrix of all unavoidable patterns) contains n zeroes, then, for the index j, we have that w(u 0 [j]) n 3 and w(s [j]) n n 3 = n +. Since w(s [j]) w(u 0 [j]) and the matrix S 0 has just one more column besides the columns in U 0, there does not exist a (, n)-threshold VCS realized

by the basis matrices S 0 and S with pixel expansion equal to (n n + )/. Hence, m n n + 6. Thus, the theorem holds.. Constructions In this section we provide some constructions for (, n)-threshold VCS. Such constructions are optimal with respect to the pixel expansion as they meet the bound of Theorem.. In order to present constructions for (, n)-threshold VCSs, we need to set up our notation. If c {0, } n (i.e., c is a binary vector of length n), then by c(i) we denote the i-th entry of c, where i n. Moreover, we denote by c i,j {0, } n the binary column such that w(c i,j ) = n and c(i) = c(j) = 0. Let I be set such that I {,..., n}. We denote by M(I) the binary matrix induced by the set of pairs belonging to I, that is M(I) is formed by the columns c i,j with (i, j) I. Since, for our construction, the order in which the pairs in I are chosen is immaterial, then the matrix M(I) is one of the I! matrices that can be constructed considering, in any order, the pairs belonging to I. Finally, with UP(, n) we denote an n ( n ) binary matrix containing all unavoidable patterns for a (, n)-threshold VCS (i.e., UP(, n) contains all the columns of weight n ). The Case n 0 mod To define the basis matrices of a (, n)-threshold VCS, we will divide the columns of UP(, n) in two matrices. The first matrix will contain n / distinct unavoidable patterns. The second matrix will contain all the n(n )/ n / remaining patters and the duplication of n/ of them. Define the sets I, I, and I 3 as follows: I = {(i, j) : i n/ and (n + )/ j n} I = {(i, j), (i + n/, j + n/) : i < j n/} I 3 = {(i, i + ) : i = p with p n/} We construct the matrices S 0 and S as depicted in Figure 3. We now illustrate the realization of the basis matrices of a (, n)-threshold VCS for n 0 mod, by considering an example of the construction depicted in Figure 3. Example. For n = 8, the matrices induced by the sets I, I, and I 3 are as

The matrix S 0 is equal to the matrix M(I ). The matrix S is formed by concatenating the matrices M(I ) and M(I 3 ). Figure 3: Basis Matrices of a (, n)-threshold VCS for n 0 mod follows: M(I ) = 0000 0000 0000 0000 0000 0000 0000 0000 M(I 3 ) = M(I ) = 0 0 0 0 0 0 0 0. 000 000 000 000 000 000 000 000 Therefore, the matrix S 0 and S generated by the construction depicted in Figure 3 are: 0000 0000 0000 0000 0000 0000 S 0 = 0000 0000 S = 0000 0000. 0000 0000 0000 0000 0000 0000 In this scheme, m = 6 and α(m) = /6. In the next theorem we prove that the matrices S 0 and S defined by the scheme in Figure 3 realize a (, n)-threshold VCS for n 0 mod. According to Theorem. the scheme is optimal with respect to the pixel expansion. 3

Theorem. The matrices S 0 and S defined by the scheme in Figure 3 realize an m-optimal (, n)-threshold VCS for n 0 mod. Proof. It is immediate to see that both matrices S 0 and S defined by the scheme in Figure 3 have n rows. The number of columns of S 0 is equal to I = n /; while, the number of columns of S is equal to I + I 3 = n(n )/ + n/ = n /. Hence, S 0 and S have the same dimensions n and m = S 0 = S. To prove that Condition of Definition.3 is satisfied, notice that I and I partition the set {(i, j) : i n, j n, and i j} and that I 3 I. According to the construction in Figure 3, for any set X = {i, j}, we have that and n / if (i, j) I w(sx) 0 = n / if (i, j) I n / if (i, j) I w(sx) = n / if (i, j) I \I 3 n / if (i, j) I 3. Therefore, Condition of Definition.3 is satisfied. To prove that Condition of Definition.3 holds, we will prove that, for any r n, it holds that w(s 0 [r]) = w(s [r]). It is immediate to see that for any r n there are n/ zeroes in S 0 [r]. Hence, w(s 0 [r]) = n/. The matrix S is equal to M(I ) M(I 3 ). Hence, w(s [r]) = w(m(i )[r]) + w(m(i 3 )[r]) = (n/ ) + = n/. Thus, for r n we have that w(s 0 [r]) = w(s [r]) and Condition of Definition.3 is satisfied. Finally, notice that since all columns of both S 0 and S have weight n, then, for any set X of participants of size at least three, it holds that w(sx 0 ) = w(sx ) = m. Hence, Condition 3 of Definition.3 is satisfied, too. Thus, the matrices S 0 and S defined by the scheme in Figure 3 realize a (, n)-threshold VCS with pixel expansion equal to n /. According to Theorem., such pixel expansion is the smallest achievable and the theorem is proved. The Case n mod Notice that, when n mod, the matrix UP(, n) has an even number of columns and that the number of zeroes in any row of UP(, n) is also even and it is equal to n. To define the basis matrices of a (, n)-threshold VCS, we will partition the columns of UP(, n) into two matrices in such a way that such matrices have the same number of columns and each row has (n )/ entries equal to zero. Define the sets I, I, I 3, and I as follows I = {(i, j) : i < j n}

I = {(i, j) : i (n + )/ and (n + 3)/ j n} I 3 = {(, j), (, j + (n )/) : j (n + 3)/} I = {(i, i + (n )/) : i (n + 3)/} Notice that the set M(I ) = UP(, n). We construct the matrices S 0 and S as depicted in Figure. Let I be the set (I I 3 )\I The matrix S 0 is equal to the matrix M(I). The matrix S is equal to the matrix M(I \I). Figure : Basis Matrices of a (, n)-threshold VCS for n mod We now illustrate the realization of the basis matrices of a (, n)-threshold VCS for n mod, by considering an example of the construction depicted in Figure. Example. For n = 9, the matrices induced by the sets I, I 3, and I are as follows: 0000 0000 0 0 0000 0 0 0000 M(I ) = 0000 M(I 3 ) = M(I ) = 0000 0 0 0000 0 0 0000 0000 Therefore, the matrix S 0 and S generated by the above construction are: 0000 0000 0000 0000 0000 0000 0000 0000 S 0 = 0000 S = 0000 0000 0000 0000 0000 0000 0000 0000 0000 In this scheme, m = 8 and α(m) = /8. 5

In the following theorem we prove that the matrices S 0 and S defined by the scheme in Figure constitute an m-optimal (, n)-threshold VCS for n mod. Theorem.3 The matrices S 0 and S defined by the scheme in Figure realize an m-optimal (, n)-threshold VCS for n mod. Proof. It is immediate to see that both matrices S 0 and S defined by the scheme in Figure have n rows. The matrices S 0 and S are a partition of UP(, n). Indeed, the matrix S = S 0 S is equal, up to a columns permutation, to UP(, n). Since I I and I I 3 = () the number of columns of S 0 is equal to S 0 = I + I 3 I = (n ) + n n = n(n ). () As S = UP(, n) S 0 = n(n )/, we get that S 0 and S have the same dimensions n and m = S 0 = S = n(n )/. Since S 0 and S constitute a partition of UP(, n), we have that for any set X of size two the matrix S[X] contains an unique columns with entries equal to zero. Therefore, either w(sx 0 ) = m and w(s X ) = m or w(s0 X ) = m and w(sx ) = m. Hence, Condition of Definition.3 is satisfied. Notice that, in any row of S there are n entries equal to zero. Hence, to prove that Condition of Definition.3 is satisfied, it is enough to prove that w(s 0 [r]) = (n )/, for r n. According to () and the construction illustrated in Figure, one has that For r =, we have that Hence, w(s 0 [r]) = w(m(i )[r]) + w(m(i 3 )[r]) w(m(i )[r]). w(m(i )[r]) = 0, w(m(i 3 )[r]) = n, and w(m(i )[r]) = 0. For r n, we have that Hence, w(s 0 [r]) = n. w(m(i )[r]) = n, w(m(i 3 )[r]) =, and w(m(i )[r]) = w(s [r]) = n. Therefore, Condition of Definition.3 is satisfied. Finally, notice that since all columns of both S 0 and S have weight n, 6

then, for any set X of participants of size at least three, it holds that w(sx 0 ) = w(sx ) = m. Hence, Condition 3 of Definition.3 is satisfied, too. Thus, the matrices S 0 and S defined by the scheme in Figure realize a (, n)-threshold VCS with pixel expansion equal to n(n )/. According to Theorem., such pixel expansion is the smallest achievable and the theorem is proved. The Case n mod The (, )-threshold VCS described by Naor and Shamir [3] satisfies Definition.3 and it is an m-optimal VCS. For completeness, we report the basis matrices realizing it: [ ] [ ] S 0 0 = S 0 =. 0 0 For n mod, n >, our construction is based on the technique used to realize the (, n)-threshold VCS for n 0 mod. To define the basis matrices of a (, n)-threshold VCS, we will divide the columns of UP(, n) in two matrices. The first matrix will contain n / distinct unavoidable patterns. The second matrix will contain all the n(n )/ n / remaining patters and the duplication of n/ of them. For n mod and n >, define the set I, I, I 3, I, and I 5 as follows: I = {(i, j) : i n/ and (n + )/ j n} I = {(i, j), (i + n/, j + n/) : i < j n/} I 3 = {(i, i + n/) : i n/} I = {(i, i + n/ + ) : i n/ } {(n/, n/ + )} I 5 = {(i, i + ), (i + n/, i + + n/) : i n/ } {(, n/), (n/ +, n)} Setting I 6 = I 3, we can construct the matrices S 0 and S as depicted in Figure 5. The matrix S 0 is formed by the columns c i,j, where (i, j) (I I 5 )\(I 3 I ). The matrix S is formed by concatenating the matrix M(I 6 ) and the matrix formed by the columns c i,j, where (i, j) (I 3 I ) (I \I 5 ). Figure 5: Basis matrices of a (, n)-threshold VCS for n mod, n > We now illustrate the realization of the basis matrices of a (, n)-threshold VCS for n mod and n >, by considering an example of the construction depicted in Figure 5. 7

Example.3 For n = 6, the matrices induced by the sets I,..., I 6 are as follows: 000 00 0 000 00 0 M(I ) = 000 000 M(I ) = 00 00 M(I 3 ) = 0 0 000 00 0 000 00 0 M(I ) = 0 0 0 0 0 0 M(I 5 ) = 00 00 00 00 00 00 M(I 6 ) = 0 0 0 0 0 0. Therefore, the matrix S 0 and S generated by the above construction are: 000 000 000 000 S 0 = 000 000 S = 000 000. 000 000 000 000 In this scheme, m = 9 and α(m) = /9. In the following theorem we prove that the matrices S 0 and S described in Figure 5 realize an m-optimal (, n)-threshold VCS for n mod and n >. Theorem. The matrices S 0 and S defined by the scheme in Figure 5 realize an m-optimal (, n)-threshold VCS for n mod and n >. Proof. It is immediate to see that both matrices S 0 and S defined by the scheme in Figure 5 have n rows. Notice that I 3 I I, I I 5 =, and I 3 I =. (3) Hence, the number of columns of S 0 is equal to S 0 = I + I 5 I 3 I = n + n n n = n. Moreover, notice that I I 3 =, I 3 I =, I I =, and I 5 I. () 8

Hence, the number of columns of S is equal to S = I 6 + I 3 + I + I I 5 = n + n + n + n(n ) n = n. Therefore, S 0 and S have the same dimensions n and m = S 0 = S. To prove that Condition of Definition.3 is satisfied notice that, from (3) and () we have [(I I 5 )\(I 3 I )] [(I 3 I ) (I \I 5 )] = (I I 5 ) (I \I 5 ) = I I. Hence, since I 3 = I 6, the matrix S = S 0 S is equal, up to a columns permutation, to the matrix M(I ) M(I ) M(I 3 ). Let X = {i, j} with (i, j) I 3. Since the matrix UP(, n) is equal, up to a columns permutation, to the matrix M(I ) M(I ), then, the column c(i, j) appears once in the matrix S. Thus, either w(sx 0 ) = m and w(s X ) = m or w(sx 0 ) = m and w(s X ) = m. If X = {i, j} with (i, j) I 3, then the column c(i, j) appears twice in the matrix S. Hence, w(sx 0 ) = m and w(s X ) = m. Thus, Condition of Definition.3 is satisfied. To prove that Condition of Definition.3 holds, we will prove that, for any r n, the number of zeroes in S 0 [r] is equal to the number of zeroes in S [r] (i.e., w(s 0 [r]) = w(s [r])). For r n, we have that w(s[r]) = w(up(, n)[r]) + w(m(i 3 )[r]) = (n ) + = n. For r n, from (3), we have that w(s 0 [r]) = w(m(i )[r]) + w(m(i 5 )[r]) w(m(i )[r]) w(m(i )[r]) = n/ + = n/. Therefore, since w(s [r]) = w(s[r]) w(s 0 [r]) = n/, for r n, we get that w(s 0 [r]) = w(s [r]) and Condition of Definition.3 holds. Finally, notice that since all columns of both S 0 and S have weight n, then, for any set X of participants of size at least three, it holds that w(sx 0 ) = w(sx ) = m. Hence, Condition 3 of Definition.3 is satisfied, too. Thus, the matrices S 0 and S defined by the scheme in Figure 5 realize, for n mod and n >, a (, n)-threshold VCS with pixel expansion equal to n /. According to Theorem., such pixel expansion is the smallest achievable and the theorem is proved. The Case n 3 mod An m-optimal (, 3)-threshold VCS is described by the following basis matrices. S 0 = 0 00 S = 0 00. (5) 0 0 9

To define the basis matrices of a (, n)-threshold VCS for n 3 mod and n > 3, we will use the matrices induced by the following sets. I = {(i, j) : i < j n} I = {(i, j) : i (n + )/ and (n + 3)/ j n} I 3 = {(i, i + (n )/) : i (n + )/} I = {(, ), (, (n + 3)/)} I 5 = {(, (n + 3)/)} I 6 = {(, i), (, i + (n )/) : i (n + )/}. We construct the basis matrices S 0 and S of a (, n)-threshold VCS for n 3 mod and n > 3 as depicted in Figure 6. Let I be the set I \I 3. The matrix S 0 is formed by concatenating the matrix M(I 6 ) and the matrix formed by the columns c i,j, where (i, j) I I. The matrix S is formed by concatenating the matrix M(I 5 ) and the matrix formed by the columns c i,j, where (i, j) I \(I I 6 ). Figure 6: Basis matrices of a (, n)-threshold VCS for n 3 mod, n > 3 We now illustrate the realization of the basis matrices of a (, n)-threshold VCS for n mod and n > 3, by considering an example of the construction depicted in Figure 6. Example. For n = 7, the matrix induced by the set I is UP(, n); while, the matrices induced by the sets I,..., I 6 are as follows: 000 000 M(I ) = 000 000 000 000 0

M(I 3 ) = 0 0 M(I ) = 00 0 0 M(I 5 ) = 0 0 M(I 6 ) = Therefore, the matrix S 0 and S generated by the above construction are: 0000 0000 0000 0000 000 000 S 0 = 000 S = 000. 0000 0000 000 000 000 000 00 0 0. In this scheme, m = and α(m) = /. In the next theorem we prove that the matrices S 0 and S defined by the scheme in Figure 6 realize a (, n)-threshold VCS for n 3 mod and n > 3. According to Theorem. the scheme is optimal with respect to the pixel expansion. Theorem.5 The matrices S 0 and S defined by the scheme in Figure 6 realize an m-optimal (, n)-threshold VCS for n 3 mod and n > 3. Proof. It is immediate to see that both matrices S 0 and S defined by the scheme in Figure 6 have n rows. Notice that Hence, the number of columns of S 0 is equal to S 0 = I 6 + I I 3 + I = n 3 Moreover, notice that I 3 I and I I =. (6) + (n ) n 3 + = n n + 6. I I 6 I, I 6 I =, and I 3 I. (7) Hence, the number of columns of S is equal to S = I 5 + I ( I I 3 + I 6 ) n(n ) = + = n n + 6. (n ) + n 3 n 3

Therefore, S 0 and S have the same dimensions n and m = S 0 = S. To prove that Condition of Definition.3 is satisfied, notice that, from (6) and () we have [I I ] [I \(I I 6 )] = (I \I 6 ) I and the matrix S = S 0 S is equal, up to a columns permutation, to the matrix M(I ) M(I ) M(I 5 ). Let X = {i, j} with (i, j) I \(I I 5 ). Since I I 5 = and I I 5 I, then, the column c(i, j) appears once in the matrix S. Hence, either w(sx 0 ) = m and w(sx ) = m or w(s0 X ) = m and w(s X ) = m. Consider now the set X = {i, j} with (i, j) I. Since I I, then the column c(i, j) appears twice in the matrix S 0. Hence, w(sx 0 ) = m and w(s X ) = m. Finally, consider the set X = {i, j} with (i, j) I 5. The column c(i, j) appears twice in the matrix S. Hence, w(sx 0 ) = m and w(s X ) = m. Thus, Condition of Definition.3 is satisfied. To prove that Condition of Definition.3 holds, we will prove that, for any r n, the number of zeroes in S 0 [r] is equal to the number of zeroes in S [r] (i.e, w(s 0 [r]) = w(s [r])). For r n, one has that w(s[r]) = w(m(i )[r]) + w(m(i )[r]) + w(m(i 5 )[r]). Hence, w(s[r]) = n + if i =,, (n + 3)/ n otherwise. Since I 3 I and I I =, one has that w(s 0 [r]) = w(m(i 6 )[r]) + w(m(i )[r]) w(m(i 3 )[r]) + w(m(i )[r]). Hence, for r n, we get that n 3 + 0 0 + if r = w(s 0 [r]) = Thus, + n + if r =, (n + 3)/ + n + 0 if 3 r (n + )/ or (n + 5)/ r (3n )/ 0 + n 0 + 0 otherwise. w(s 0 [r]) = n+ if r =,, (n + 3)/ n otherwise. Therefore, since w(s [r]) = w(s[r]) w(s 0 [r]) = w(s[r])/, for r n, we get that w(s 0 [r]) = w(s [r]) and Condition of Definition.3 is satisfied.

Finally, notice that since all columns of both S 0 and S have weight n, then, for any set X of participants of size at least three, it holds that w(s 0 X ) = m. Hence, Condition 3 of Definition.3 is satisfied, too. Therefore, the matrices S 0 and S described in Figure 6 are the basis matrices of a (, n)-threshold VCS for n 3 mod and n > 3. According to Theorem., such pixel expansion is the smallest achievable and the theorem is proved. Comparison We have seen that, in order to implement a visual cryptography scheme, each pixel of the secret image is subdivided into m subpixels. Hence, there is a loss of resolution proportional to m. Therefore, schemes with smaller pixel expansion are better. In [] the authors described a (, n)-threshold visual cryptography scheme having pixel expansion m such that (n )(n+3) if n is odd m = n(n+) if n is even It is immediate to see that the pixel expansion of the schemes presented in this paper is smaller. Hence, our schemes are better. Another important measure to measure the goodness of a visual cryptography scheme is the relative difference. Schemes with higher relative difference are better. Since, the relative difference of our schemes and of the ones proposed in [] is equal to /m, then our schemes improves on the relative difference, too. References [] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Visual Cryptography for General Access Structures, Information and Computation, Vol. 9, No., pp. 86 06, 996. [] C. Blundo, A. De Santis, and D. R. Stinson, On the Contrast in Visual Cryptography Schemes, in Journal of Cryptology, Vol., pp. 6 89, 999. [3] M. Naor and A. Shamir, Visual Cryptography, in Advances in Cryptology Eurocrypt 9, A. De Santis Ed., Vol. 950 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp., 995. [] W.-G. Tzeng and C.-M. Hu, A New Approach for Visual Cryptography, Designs, Codes and Cryptography, Vol. 7, No. 3, pp. 07 7, 00. 3