Advertisement

Improved (k, n) Visual Secret Sharing Based on Random Grids

  • Pritam KumariEmail author
  • Rajneesh Rani
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 713)

Abstract

(k, n) Visual secret sharing (VSS) is a cryptographic procedure in which secret information in the form of images is encoded into ‘n’ shares (or shadow images) such that secret is recovered only if ‘k’ or more shares are superimposed, whereas superimposing not as much as ‘k’ shares provides no information regarding secret. In this paper, (k, n) VSS based on random grids is proposed which requires no design for codebook and does not involve pixel expansion. The proposed scheme produces better results in terms of improved contrast which decides visual quality. Many experiments are executed to assess the efficacy and security of the proposed approach. The proposed scheme is compared with existing schemes to show its benefits.

Keywords

Pixel expansion Random grid Visual secret sharing Contrast 

References

  1. 1.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)Google Scholar
  2. 2.
    Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377–379 (1987)CrossRefGoogle Scholar
  3. 3.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)MathSciNetzbMATHCrossRefGoogle Scholar
  4. 4.
    Blundo, C., Bonis, A.D., Santis, A.D.: Improved schemes for visual cryptography. Des. Codes Cryptogr. 24(3), 255–278 (2001)MathSciNetzbMATHCrossRefGoogle Scholar
  5. 5.
    Blundo, C., Arco, P.D’., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM J. Discret. Math. 16(2), 224–261 (2003)MathSciNetzbMATHCrossRefGoogle Scholar
  6. 6.
    Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. E82-A(10), 2172–2177 (1999)Google Scholar
  7. 7.
    Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481–494 (2004)CrossRefGoogle Scholar
  8. 8.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1), 143–161 (2001)MathSciNetzbMATHCrossRefGoogle Scholar
  9. 9.
    Liu, F., Wu, C.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6, 07–322 (2011)CrossRefGoogle Scholar
  10. 10.
    Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)CrossRefGoogle Scholar
  11. 11.
    Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383–396 (2009)Google Scholar
  12. 12.
    Shyu, S.: Image encryption by random grids. Pattern Recognit. 40(3), 1014–1031 (2007)zbMATHCrossRefGoogle Scholar
  13. 13.
    Chen, T., Tsao, K.: Visual secret sharing by random grids revisited. Pattern Recognit. 42(9), 2203–2217 (2009)zbMATHCrossRefGoogle Scholar
  14. 14.
    Shyu, S.: Image encryption by multiple random grids. Pattern Recognit. 42(7), 1582–1596 (2009)zbMATHCrossRefGoogle Scholar
  15. 15.
    Chen, T., Tsao, K.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84(7), 1197–1208 (2011)CrossRefGoogle Scholar
  16. 16.
    Guo, T., Liu, F., Wu, C.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. (2013). (in press)Google Scholar
  17. 17.
    Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Signal Process. 93(5), 977–995 (2013)CrossRefGoogle Scholar
  18. 18.
    Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on Boolean operations. Pattern Recognit. 40(10), 2776–2785 (2007)zbMATHCrossRefGoogle Scholar
  19. 19.
    Wu, X., Sun, W.: Random grid-based visual secret sharing with abilities of OR and XOR decryptions. J. Vis. Commun. Image Represent. 24(1), 48–62 (2013)CrossRefGoogle Scholar
  20. 20.
    Yan, X., Wang, S., Niu, X., Yang, C.N.: Random grid-based visual secret sharing with multiple decryptions. J. Vis. Commun. Image R. 26, 94–104 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringDr. B. R. Ambedkar National Institute of TechnologyJalandharIndia

Personalised recommendations