Advertisement

Non-expanding Friendly Visual Cryptography

  • Wen-Pinn Fang
  • Ran-Zan Wang
  • Shang-Kuan Chen
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 238)

Abstract

This paper proposed a non-expanding visual sharing scheme. Based on probability method, a friendly visual secret sharing result is approached. Different from traditional friendly visual cryptography method with block expansion characteristic, the proposed method preserve the size of shares. The result is also demonstrates in the paper.

Index Terms

visual secret sharing transparency friendly non-expanding 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  2. 2.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structure. Information and Computing 129, 86–106 (1996)CrossRefzbMATHGoogle Scholar
  3. 3.
    Wu, H.C., Chang, C.C.: Sharing visual multi-secrets using circle shares. Computer Standards & Interfaces 28, 123–135 (2005)CrossRefGoogle Scholar
  4. 4.
    Fang, W.P., Lin, J.C.: Visual Cryptography with Extra Ability of Hiding Confi-dential Data. Journal of Electronic Imaging 15, 023020 (2006)Google Scholar
  5. 5.
    Fang, W.P.: Visual Cryptography in reversible style. In: IEEE Proceeding on the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), Kaohsiung, Taiwan, R.O.C., November 26-28 (2007)Google Scholar
  6. 6.
    Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optics Letters 12(6), 377–379 (1987)CrossRefGoogle Scholar
  7. 7.
    Shyu, S.J.: Image encryption by random grids. Pattern Recognition 40(3), 1014–1031 (2007)CrossRefzbMATHGoogle Scholar
  8. 8.
  9. 9.
    Lukac, R., Plataniotis, K.N.: Bi-level based secret sharing for image encryption. Pattern Recognition 38, 767–772 (2005)CrossRefzbMATHGoogle Scholar
  10. 10.
    Fang, W.P., Lin, J.C.: Multi-channel Secret Image Transmission with Fast Decoding: by using Bit-level Sharing and Economic-size Shares. International Journal of Computer and Network Security 6, 228–234 (2006)Google Scholar
  11. 11.
    Fang, W.P.: Non-expansion Visual Secret Sharing in Reversible Style. International Journal of Computer and Network Security 9(2), 204–208 (2009)Google Scholar
  12. 12.
    Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25, 481–494 (2004)CrossRefGoogle Scholar
  13. 13.
    Fang, W.-P.: A Survey for Visual Sharing Scheme with Geometry Property. Journal of Image Processing and Communication 2(1), 35–39 (2010)Google Scholar
  14. 14.
    Fang, W.P.: Maximizing the Secret Hiding Ratio in Visual Secret Sharing with Reversible Property. International Journal of Computer and Network SecureGoogle Scholar
  15. 15.
    Fang, W.P., Lin, J.C.: Multi-channel Secret Image Transmission with Fast Decoding: by using Bit-level Sharing and Economic-size Shares. International Journal of Computer and Network Security 6, 228–234 (2006)Google Scholar
  16. 16.

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Computer Science & Information EngineeringYuanpei UniversityHsinChuTaiwan
  2. 2.Department of Computer Science & EngineeringYuan Ze UniversityTaiwanTaiwan

Personalised recommendations