DOI QR코드

DOI QR Code

Improved Contrast for Threshold Random-grid-based Visual Cryptography

  • Hu, Hao (China National Digital Switching System Engineering and Technological Research Center) ;
  • Shen, Gang (Zhengzhou Information Science and Technology Institute) ;
  • Fu, Zhengxin (Zhengzhou Information Science and Technology Institute) ;
  • Yu, Bin (Zhengzhou Information Science and Technology Institute)
  • Received : 2017.08.11
  • Accepted : 2018.02.13
  • Published : 2018.07.31

Abstract

Pixel expansion and contrast are two major performance parameters for visual cryptography scheme (VCS), which is a type of secret image sharing. Random Grid (RG) is an alternative approach to solve the pixel expansion problem. Chen and Tsao proposed the first (k, n) RG-based VCS, and then Guo et al., Wu et al., Shyu, and Yan et al. significantly improved the contrast in recent years. However, the investigations on improving the contrast of threshold RG-based VCS are not sufficient. In this paper, we develop a contrast-improved algorithm for (k, n) RG-based VCS. Theoretical analysis and experimental results demonstrate that the proposed algorithm outperformers the previous threshold algorithms with better visual quality and a higher accuracy of contrast.

Keywords

References

  1. M. Naor and A. Shamir, "Visual cryptography," in Proc. of Workshop on the Theory and Application of of Cryptographic Techniques. vol.950, pp.1-12, 1994.
  2. O. Kafri and E. Keren, "Encryption of pictures and shapes by random grids," Optics Letters, vol.12, no.6, pp.377-379, 1987. https://doi.org/10.1364/OL.12.000377
  3. G. Ateniese, C. Blundo, A. De Santis, and D. Stinson, "Visual cryptography for general access structures," Information and Computation, vol.129, no.2, pp.86-106, 1996. https://doi.org/10.1006/inco.1996.0076
  4. G. Shen, F. Liu, Z. Fu, and B. Yu, "New insight into linear algebraic technique to construct visual cryptography scheme for general access structure," Multimedia Tools and Applications, vol.72, no.16, pp.14511-14533, 2017.
  5. Z. Fu and B. Yu, "Optimal pixel expansion of deterministic visual cryptography scheme," Multimedia Tools and Applications, vol.73, no.3, pp.1177-1193, 2014. https://doi.org/10.1007/s11042-013-1625-3
  6. S. Shyu, and M. Chen, "Optimum pixel expansions for threshold visual secret sharing schemes," IEEE Transactions on Information Forensics and Security, vol.6, no.3, pp.960-969, 2011. https://doi.org/10.1109/TIFS.2011.2158096
  7. G. Shen, F. Liu, Z. Fu, and B. Yu, "Perfect contrast XOR-based visual cryptography schemes via linear algebra," Designs Codes and Cryptography, vol.85, no.1, pp.15-37, 2017. https://doi.org/10.1007/s10623-016-0285-5
  8. A. De Bonis and A. De Santis, "Randomness in secret sharing and visual cryptography schemes," Theoretical Computer Science, vol.314, no.3, pp.351-374, 2004. https://doi.org/10.1016/j.tcs.2003.12.018
  9. Y. C. Chen, "Fully incrementing visual cryptography from a succinct non-monotonic structure," IEEE Transactions on Information Forensics and Security, vol.12, no.5, pp.1082-1091, 2017. https://doi.org/10.1109/TIFS.2016.2641378
  10. X. Yan, S. Wang, X. Niu, and C. N. Yang, "Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality," Digital Signal Processing, vol.38, no.C, pp.53-65, 2015. https://doi.org/10.1016/j.dsp.2014.12.002
  11. Y. Ren, F. Liu, T. Guo, R. Feng, and D. Lin, "Cheating prevention visual cryptography scheme using Latin square," IET Information Security, vol.11, no.4, pp.211-219, 2017. https://doi.org/10.1049/iet-ifs.2016.0126
  12. F. Liu, C. Wu, and X. Lin, "Cheating immune visual cryptography scheme," IET Information Security, vol.5, no.1, pp.51-59, 2011. https://doi.org/10.1049/iet-ifs.2008.0064
  13. Z. Wang, G. Arce, and G. Di Crescenzo, "Halftone visual cryptography via error diffusion," IEEE Transactions on Information Forensics and Security, vol.4, no.3, pp.383-396, 2009. https://doi.org/10.1109/TIFS.2009.2024721
  14. S. Shivendra and A. Suneeta, "Progressive Visual Cryptography with Unexpanded Meaningful Shares," ACM Transactions on Multimedia Computing, Communications, and Applications, vol.12, no.4, pp.1-24, 2016.
  15. C. Yang, H. Shih, C. Wu, and L. Harn, "k out of n region incrementing scheme in visual cryptography," IEEE Transactions on Circuits and Systems for Video Technology, vol.22, no.5, pp.799-810, 2012. https://doi.org/10.1109/TCSVT.2011.2180952
  16. G. Wang, W. Yan, and M. Kankanhalli, "Content based authentication of visual cryptography," Multimedia Tools and Applications, vol.76, no.7, pp.9427-9441, 2017. https://doi.org/10.1007/s11042-016-3549-1
  17. C. Yang, "New visual secret sharing schemes using probabilistic method," Pattern Recognition Letters, vol.25, no.4, pp. 481-494, 2014. https://doi.org/10.1016/j.patrec.2003.12.011
  18. S. Cimato, A. R. Prisco, and D. Santis, "Probabilistic visual cryptography schemes," The Computer Journal, vol.49, no.1 pp.97-107, 2006. https://doi.org/10.1093/comjnl/bxh152
  19. S. Shyu, "Image encryption by random grids," Pattern Recognition, vol.40, no.3, pp.1014-1031, 2007. https://doi.org/10.1016/j.patcog.2006.02.025
  20. S. Shyu, "Image encryption by multiple random grids," Pattern Recognition, vol.42, no.7, pp.1582-1596, 2009. https://doi.org/10.1016/j.patcog.2008.08.023
  21. T. Chen and K. Tsao, "Visual secret sharing by random grids revisited," Pattern Recognition, vol.42, no.9, pp.2203-2217, 2009. https://doi.org/10.1016/j.patcog.2008.11.015
  22. T. Chen and K. Tsao, "Threshold visual secret sharing by random grids," Journal of Systems and Software, vol.84, no.7, pp.1197-1208, 2011. https://doi.org/10.1016/j.jss.2011.02.023
  23. X. Wu and W. Sun, "Random grid-based visual secret sharing for general access structures with cheat-preventing ability," Journal of Systems and Software, vol.85, no.5 pp.1119-1134, 2011. https://doi.org/10.1016/j.jss.2011.12.041
  24. X. Wu and W. Sun, "Visual secret sharing for general access structures by random grids," IET Information Security, vol.6, no.4, pp.299-309, 2012. https://doi.org/10.1049/iet-ifs.2012.0046
  25. S. Shyu, "Visual cryptograms of random grids for general access structures," IEEE Transactions on Circuits and Systems for Video Technology, vol.23, no.3, pp.414-424, 2013. https://doi.org/10.1109/TCSVT.2012.2204940
  26. X. Wu and W. Sun, "Random grid-based visual secret sharing with abilities of OR and XOR decryptions," Journal of Visual Communication and Image Representation, vol.24, no.1, pp.48-62, 2013. https://doi.org/10.1016/j.jvcir.2012.11.001
  27. T. Chen and K. Tsao, "User-friendly random-grid-based visual secret sharing," IEEE Transactions on Circuits and Systems for Video Technology, vol.21, no.11, pp.1693-1703, 2011. https://doi.org/10.1109/TCSVT.2011.2133470
  28. X. Yan, Y. Lu, H. Huang, L. Liu, and S. Wan, "Quality-adaptive threshold visual secret sharing by random grids," in Proc. of IEEE International Conference on Signal and Image Processing, pp. 323-327, 2017.
  29. X. Yan and Y. Lu, "Participants increasing for threshold random grids-based visual secret sharing," Journal of Real-Time Image Processing, vol. 14, no.1, pp.13-24, 2018. https://doi.org/10.1007/s11554-016-0639-2
  30. H. C. Chao and T. Y. Fan, "Random-grid based progressive visual secret sharing scheme with adaptive priority," Digital Signal Processing, vol.68, pp.69-80, 2017. https://doi.org/10.1016/j.dsp.2017.05.009
  31. Z. Fu and B. Yu, "Visual cryptography and random grids schemes," in Proc. of 12th International Workshop on Digital-Forensics and Watermarking, pp.109-122, 2013.
  32. C. N. Yang, C. C. Wu, and D. S. Wang, "A discussion on the relationship between probabilistic visual cryptography and random grid," Information Sciences, vol.278, no.10, pp.141-173, 2014. https://doi.org/10.1016/j.ins.2014.03.033
  33. T. Guo, F. Liu, and C. Wu, "Threshold visual secret sharing by random grids with improved contrast," Journal of Systems and Software, vol.86, no.8, pp.2094-2109, 2013. https://doi.org/10.1016/j.jss.2013.03.062
  34. X. Wu and W. Sun, "Improving the visual quality of random grid-based visual secret sharing," Signal Processing, vol.93, no.5, pp.977-995, 2013. https://doi.org/10.1016/j.sigpro.2012.11.014
  35. S. Shyu, "Visual cryptograms of random grids for threshold access structures," Theoretical Computer Science, vol.565, pp.30-49, 2015. https://doi.org/10.1016/j.tcs.2014.10.048
  36. X. Yan, X. Liu, and C. N. Yang, "An enhanced threshold visual secret sharing based on random grids," Journal of Real-Time Image Processing, pp.1-13, 2015.

Cited by

  1. A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code vol.2019, pp.None, 2019, https://doi.org/10.1155/2019/7937816
  2. An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission vol.14, pp.7, 2018, https://doi.org/10.3837/tiis.2020.07.007