Advertisement

Hierarchical visual cryptography for multisecret images based on a modified phase retrieval algorithm

  • Tieyu ZhaoEmail author
  • Yingying Chi
Article
  • 11 Downloads

Abstract

Visual cryptography is generally based on the base matrix scheme or the random grid scheme. These schemes may cause some problems, such as the expansion of the shares and the recovered images and the distortion of the recovered images. In this paper, we propose a modified phase retrieval algorithm and present a hierarchical visual cryptography scheme (HVCS). The scheme overcomes the problems that are mentioned and can share multiple secret images. Considering the differences in the social division of labor, there is a hierarchy between the shared images in the proposed scheme, that is, the participants have different rights. Further, to make the proposed scheme more applicable to practical needs, we propose a generalized HVCS by modifying the phase retrieval algorithm again so that each level can have more than one participant. The effectiveness and feasibility of the proposed scheme are verified by theoretical analysis and numerical simulation.

Keywords

Secret sharing Visual cryptography Multiple secrets sharing Phase retrieval algorithm 

Notes

Acknowledgements

The authors would like to thank the reviewers for their valuable comments. This study was supported by the National Natural Science Foundation of China (No. 61702088); the Central University Basic Research Service Fees, China (No. N172303014); and the School PhD Fund, Northeastern University, Qinhuangdao, China (XNB201708).

References

  1. 1.
    Chavan PV, Atique M (2012) Design of hierarchical visual cryptography. Nirma University International Conference on Engineering (NUiCONE). IEEE: 1–3Google Scholar
  2. 2.
    Chen J, Chen TS, Hsu HC et al (2009) Using multi-ringed shadow image of visual cryptography to hide more secret messages. Imaging Sci J 57(2):101–108CrossRefGoogle Scholar
  3. 3.
    Chen W, Chen X, Stern A et al (2013) Phase-modulated optical system with sparse representation for information encoding and authentication. IEEE Photonics Journal 5(2):6900113CrossRefGoogle Scholar
  4. 4.
    Feng JB, Wu HC, Tsai CS et al (2008) Visual secret sharing for multiple secrets. Pattern Recogn 41(12):3572–3581CrossRefGoogle Scholar
  5. 5.
    Gerchberg RW, Saxton WO (1972) A practical algorithm for the determination of phase from image and diffraction plane pictures. Optik 35:237–246Google Scholar
  6. 6.
    Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377–379CrossRefGoogle Scholar
  7. 7.
    Lee JS, Chang CC, Huynh NT et al (2015) Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique. Digit Signal Process 40:131–139MathSciNetCrossRefGoogle Scholar
  8. 8.
    Meng XF, Cai LZ, Yang XL, Shen XX, Dong GY (2006) Information security system by iterative multiple-phase retrieval and pixel random permutation. Appl Opt 45(14):3289–3297CrossRefGoogle Scholar
  9. 9.
    Naor M, Shamir A (1994) Visual cryptography. Workshop on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp 1–12Google Scholar
  10. 10.
    Patel T, Srivastava R (2016) Hierarchical visual cryptography for grayscale image. Online International Conference on Green Engineering and Technologies (IC-GET). IEEE: 1–4Google Scholar
  11. 11.
    Pirbhulal S, Wu W, Li G (2018) A biometric security model for wearable healthcare. IEEE International Conference on Data Mining Workshops (ICDMW). IEEE: 136–143Google Scholar
  12. 12.
    Pirbhulal S, Samuel OW, Wu W et al (2019) A joint resource-aware and medical data security framework for wearable healthcare systems. Futur Gener Comput Syst 95:382–391CrossRefGoogle Scholar
  13. 13.
    Shyu SJ, Huang SY, Lee YK et al (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40(12):3633–3651CrossRefGoogle Scholar
  14. 14.
    Talat R, Muzammal M, Gohar M, et al. (2019) A decentralised disaster detection approach using image data. IEEE 89th Vehicular Technology Conference (VTC2019-Spring). IEEE: 1–5Google Scholar
  15. 15.
    Wu HC, Chang CC (2005) Sharing visual multi-secrets using circle shares. Comput Standards Interfaces 28(1):123–135CrossRefGoogle Scholar
  16. 16.
    Wu CC, Chen LH (1998) A study on visual cryptography. Master's thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, ROC.Google Scholar
  17. 17.
    Wu W, Pirbhulal S, Li G (2018) Adaptive computing-based biometric security for intelligent medical applications. Neural Comput & Applic: 1–10Google Scholar
  18. 18.
    Yang CN, Chung TH (2010) A general multi-secret visual cryptography scheme. Opt Commun 283(24):4949–4962CrossRefGoogle Scholar
  19. 19.
    Yang CN, Chung TH (2013) Cryptanalysis of Chen et al.’s multi-secret visual cryptography scheme. Imaging Sci J 61(3):334–340CrossRefGoogle Scholar
  20. 20.
    Yu B, Shen G (2014) Multi-secret visual cryptography with deterministic contrast. Multimed Tools Appl 72(2):1867–1886MathSciNetCrossRefGoogle Scholar
  21. 21.
    Zhao T, Chi Y (2018) A novel secret sharing with two users based on joint transform correlator and compressive sensing[J]. J Mod Opt 65(9):1072–1080CrossRefGoogle Scholar
  22. 22.
    Zhao T, Ran Q, Yuan L et al (2016) Optical image encryption using password key based on phase retrieval algorithm. J Mod Opt 63(8):771–776CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Authors and Affiliations

  1. 1.Information Science Teaching and Research SectionNortheastern University at QinhuangdaoQinhuangdaoChina

Personalised recommendations