Skip to main content

Various Problems in Visual Cryptography

  • Chapter
  • First Online:
Visual Cryptography for Image Processing and Security

Abstract

Various visual cryptography problems will be discussed in this chapter. Some typical problems of visual cryptography such as alignment problem, flipping problem, cheating problem, distortion problem and the thin line problem will be investigated in this chapter. Consequently, the relevant solutions will be provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akansu AN, Haddad RA (1992) Multiresolution signal decomposition: Transforms, subbands, and wavelets. Academic Press, Boston, MA

    MATH  Google Scholar 

  2. Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129:86–106

    Article  MATH  Google Scholar 

  3. Ateniese G, Blundo C, Santis AD, Stinson DR (2001) Extended capabilities for visual cryptography. ACM Theory Comput Sci 250(1–2):143–161

    Article  MATH  Google Scholar 

  4. Biham E, Itzkovitz A (1997) Visual cryptography with polarization. In CRYPTO ’98

    Google Scholar 

  5. Blundo C, Santis A, Stinson DR (1999) On the contrast in visual cryptography schemes. J Cryptol 12(4):261–289

    Article  MATH  Google Scholar 

  6. Blundo C, Bonis A, Santis A (2001) Improved schemes for visual cryptography. Des Codes Cryptogr 24:255–278

    Article  MATH  MathSciNet  Google Scholar 

  7. Blundo C, D’Arco P, Santis A, Stinson DR (2003) Contrast optimal threshold visual cryptography schemes. SIAM J Discrete Math 16(2):224–261

    Article  MATH  MathSciNet  Google Scholar 

  8. Bose M, Mukerjee R (2010) Optimal \((k, n)\) visual cryptographic schemes for general \(k\). Des Codes Cryptogr 55:19–35

    Article  MATH  MathSciNet  Google Scholar 

  9. Chang CY (2000) Visual cryptography for color images (Masters Thesis). National Central University (Taiwan)

    Google Scholar 

  10. Chen TH, Tsao KH, Wei KC (2008) Multiple-image encryption by rotating random grids. International Conference on Intelligent Systems Design and Applications 3:252–256

    Google Scholar 

  11. Chen YF, Chan YK, Huang CC, Tsai MH, Chu YP (2007) A multiple-level visual secret-sharing scheme without image size expansion. Inf Sci 177:4696–4710

    Article  MATH  MathSciNet  Google Scholar 

  12. Cimato S, Prisco R, Santis A (2005) Optimal colored threshold visual cryptography schemes. Des Codes Cryptogr 35:311–335

    Article  MATH  MathSciNet  Google Scholar 

  13. Cimato S, Prisco RD, Santis AD (2006) Probabilistic visual cryptography schemes. Comput J 49(1):97–107

    Article  Google Scholar 

  14. Cimato S, Yang CN (2011) Visual cryptography and secret image sharing. CRC Press, Taylor & Francis, UK

    Google Scholar 

  15. Degara-Quintela N, Perez-Gonzalez F (2003) Visible encryption: using paper as a secure channel, security and watermarking of multimedia contents. In: Proceedings of SPIE’03, 5020

    Google Scholar 

  16. Droste S (1996) New results on visual cryptography. Springer, Berlin CRYPTO’96.

    Google Scholar 

  17. Fang WP (2009) Non-expansion visual secret sharing in reversible style. Int J Comput Sci Netw Secur 9(2):204–208

    Google Scholar 

  18. Floyd RW, Steinberg L (1976) An adaptive algorithm for spatial grey scale. In: Proceedings of the Society of Information Display. 17:75–77

    Google Scholar 

  19. Hou YC, Chang CY, Lin F (1999) Visual cryptography for colour images based on colour decomposition. In Proceedings of 5th conference on information management. 584–591

    Google Scholar 

  20. Hou YC, Chang CY, Tu SF (2001) Visual cryptography for color images based on halftone technology. In: Proceedings of international conference on information systems, analysis and synthesis (world multiconference on systemics, cybernetics and informatics)

    Google Scholar 

  21. Hou YC (2003) Visual cryptography for color images. Pattern Recognit 36:1619–1629

    Article  Google Scholar 

  22. Hou YC, Xu CS (2003) A probability-based optimization model for sharing multiple secret images without pixel expansion. J Inf Technol Soc 2:19–38

    Google Scholar 

  23. Hou YC, Tu CF (2004) Visual cryptography techniques for colour images without pixel expansion. J Inf Technol Soc 1:95–110

    Google Scholar 

  24. Hou YC, Tu SF (2005) A visual cryptographic technique for chromatic images using multi-pixel encoding method. J Res Pract Infor Technol 37(2):179–191

    Google Scholar 

  25. Hsu HC, Chen TS, Lin YH (2004) The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. Netw Sens Control 2:996–1001

    Google Scholar 

  26. Ito R, Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE transactions on fundamentals of electronics, communications and computer sciences. E82-A(10), 2172–2177

    Google Scholar 

  27. Jin D (2003) Progressive color visual cryptography (Masters Thesis). National University of Singapore, Singapore

    Google Scholar 

  28. Katoh T, Imai H (1996) An extended construction method for visual secret sharing schemes. IEICE Trans J79–A(8):1344–1351

    Google Scholar 

  29. Kobara K, Imai H (1996) Limiting the visible space visual secret sharing schemes and their application to human identification. Springer, Berlin, pp 185–195 ASIACRYPT ’96. LNCS

    Google Scholar 

  30. Koga H (2002) A general formula of the \((t, n)\)-threshold visual secret sharing scheme. Springer, Berlin, pp 328–345 LNCS 2501 (ASIACRYPT ’02)

    Google Scholar 

  31. Krause M, Simon HU (2003) Determining the optimal contrast for secret sharing schemes in visual cryptography. Comb Probab Comput 12(3):285–299

    Article  MATH  MathSciNet  Google Scholar 

  32. Kuwakado H, Tanaka H (2004) Size-reduced visual secret sharing scheme. IEICE Trans Fundam E87–A(5):1193–1197

    Google Scholar 

  33. Lin CH (2002) Visual cryptography for color images with image size invariable shares (Masters Thesis). National Central University, Taiwan

    Google Scholar 

  34. Lin SJ, Chen SK, Lin JC (2010) Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J Vis Commun Image Represent 21(8):900–916

    Article  Google Scholar 

  35. Liu F, Wu CK, Lin XJ (2009) The alignment problem of visual cryptography schemes. Des Codes Cryptogr 50(2):215–227

    Article  MathSciNet  Google Scholar 

  36. Liu F, Wu CK, Lin XJ (2010) A new definition of the contrast of visual cryptography scheme. Inf Process Lett 110:241–246

    Article  MATH  MathSciNet  Google Scholar 

  37. Liu F, Wu CK, Lin XJ (2010) Step construction of visual cryptography schemes. IEEE Trans Inf Forensics Secur 5(1):27–38

    Article  Google Scholar 

  38. Liu F, Wu CK (2011) Embedded meaningful share visual cryptography schemes. IEEE Trans Inf Forensics Secur 6(2):307–322

    Article  Google Scholar 

  39. Monoth T, Anto B (2010) Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput Sci 2:143–148

    Article  Google Scholar 

  40. Naor M, Shamir A (1995) Visual cryptography. Springer, Berlin, pp 1–12 LNCS 950 (EUROCRYPT ’94)

    Google Scholar 

  41. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MATH  MathSciNet  Google Scholar 

  42. Shyu SJ (2006) Efficient visual secret sharing scheme for color images. Pattern Recognit 39(5):866–880

    Article  MATH  Google Scholar 

  43. Shyu SJ, Huang SY, Lee YK, Wang RZ, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recognit 40(12):3633–3651

    Article  MATH  Google Scholar 

  44. Shyu SJ (2007) Image encryption by random grids. Pattern Recognit 40:1014–1031

    Article  MATH  Google Scholar 

  45. Surekha B, Swamy G, Rao KS (2010) A multiple watermarking technique for images based on visual cryptography. Comput Appl 1:77–81

    Google Scholar 

  46. Viet DQ, Kurosawa K (2004) Almost ideal contrast visual cryptography with reversing. In Topics in Cryptology - CT-RSA. Springer, Berlin, pp 353–365

    Google Scholar 

  47. Weir J, Yan W (2010) A comprehensive study of visual cryptography. transactions on data hiding and multimedia security. Springer, Berlin

    Google Scholar 

  48. Weir J, Yan W (2009) Sharing multiple secrets using visual cryptography. In IEEE international symposium on circuits and systems (ISCAS’09). 509–512

    Google Scholar 

  49. Weir J, Yan W (2010) Resolution variant visual cryptography for street view of Google maps. In IEEE international symposium on circuits and systems (ISCAS’10)

    Google Scholar 

  50. Wu XY, Wong DS, Li Q (2009) Threshold visual cryptography scheme for color images with no pixel expansion. In: Proceedings of the second symposium international computer science and computational technology (ISCSCT’09). 310–315

    Google Scholar 

  51. Wu HC, Chang CC (2005) Sharing visual multi-secrets using circle shares. Comput Stand Interfaces 28:123–135

    Article  Google Scholar 

  52. Wu C, Chen L (1998) A study on visual cryptography (Masters Thesis). National Chiao Tung University, Taiwan

    Google Scholar 

  53. Yan W, Duo J, Kankanhalli MS (2004) Visual cryptography for print and scan applications. In : Proceedings of IEEE international symposium on circuits and systems (ISCAS’04), Canada. 572–575

    Google Scholar 

  54. Yang CN, Laih CS (2000) New coloured visual secret sharing schemes. Des. Codes Cryptogr. 20:325–335

    Article  MATH  MathSciNet  Google Scholar 

  55. Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recognit Lett 25:481–494

    Article  Google Scholar 

  56. Yang CN, Chen TS (2005) Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recognit Lett 26:193–206

    Article  Google Scholar 

  57. Yang CN, Chen TS (2005) Size-adjustable visual secret sharing schemes. IEICE Trans Fundam E88–A(9):2471–2474

    Article  Google Scholar 

  58. Yang CN, Chen TS (2006) New size-reduced visual secret sharing schemes with half reduction of shadow size. IEICE Trans Fundam E89–A(2):620–625

    Article  Google Scholar 

  59. Yang CN, Chen TS (2006) Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recognit 39:1300–1314

    Article  MATH  Google Scholar 

  60. Yang CN, Chen TS (2007) Extended visual secret sharing schemes: improving the shadow image quality. Int J Pattern Recognit Artif Intell 21(5):879–898

    Article  Google Scholar 

  61. Yang CN, Chen TS (2007) Visual secret sharing scheme: prioritizing the secret pixels with different pixel expansions to enhance the image contrast. Opt Eng 46(9):097005

    Article  Google Scholar 

  62. Zhou Z, Arce GR, Crescenzo GD (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453

    Article  Google Scholar 

  63. Zhu BS, Wu JK, Kankanhalli MS (2003) Print signatures for document authentication. In: Proceedings of ACM conference on computer and communications security. 145–153

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Feng Liu .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Liu, F., Yan, W.Q. (2014). Various Problems in Visual Cryptography. In: Visual Cryptography for Image Processing and Security. Springer, Cham. https://doi.org/10.1007/978-3-319-09644-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09644-5_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09643-8

  • Online ISBN: 978-3-319-09644-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics