Abstract
Various visual cryptography problems will be discussed in this chapter. Some typical problems of visual cryptography such as alignment problem, flipping problem, cheating problem, distortion problem and the thin line problem will be investigated in this chapter. Consequently, the relevant solutions will be provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akansu AN, Haddad RA (1992) Multiresolution signal decomposition: Transforms, subbands, and wavelets. Academic Press, Boston, MA
Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129:86–106
Ateniese G, Blundo C, Santis AD, Stinson DR (2001) Extended capabilities for visual cryptography. ACM Theory Comput Sci 250(1–2):143–161
Biham E, Itzkovitz A (1997) Visual cryptography with polarization. In CRYPTO ’98
Blundo C, Santis A, Stinson DR (1999) On the contrast in visual cryptography schemes. J Cryptol 12(4):261–289
Blundo C, Bonis A, Santis A (2001) Improved schemes for visual cryptography. Des Codes Cryptogr 24:255–278
Blundo C, D’Arco P, Santis A, Stinson DR (2003) Contrast optimal threshold visual cryptography schemes. SIAM J Discrete Math 16(2):224–261
Bose M, Mukerjee R (2010) Optimal \((k, n)\) visual cryptographic schemes for general \(k\). Des Codes Cryptogr 55:19–35
Chang CY (2000) Visual cryptography for color images (Masters Thesis). National Central University (Taiwan)
Chen TH, Tsao KH, Wei KC (2008) Multiple-image encryption by rotating random grids. International Conference on Intelligent Systems Design and Applications 3:252–256
Chen YF, Chan YK, Huang CC, Tsai MH, Chu YP (2007) A multiple-level visual secret-sharing scheme without image size expansion. Inf Sci 177:4696–4710
Cimato S, Prisco R, Santis A (2005) Optimal colored threshold visual cryptography schemes. Des Codes Cryptogr 35:311–335
Cimato S, Prisco RD, Santis AD (2006) Probabilistic visual cryptography schemes. Comput J 49(1):97–107
Cimato S, Yang CN (2011) Visual cryptography and secret image sharing. CRC Press, Taylor & Francis, UK
Degara-Quintela N, Perez-Gonzalez F (2003) Visible encryption: using paper as a secure channel, security and watermarking of multimedia contents. In: Proceedings of SPIE’03, 5020
Droste S (1996) New results on visual cryptography. Springer, Berlin CRYPTO’96.
Fang WP (2009) Non-expansion visual secret sharing in reversible style. Int J Comput Sci Netw Secur 9(2):204–208
Floyd RW, Steinberg L (1976) An adaptive algorithm for spatial grey scale. In: Proceedings of the Society of Information Display. 17:75–77
Hou YC, Chang CY, Lin F (1999) Visual cryptography for colour images based on colour decomposition. In Proceedings of 5th conference on information management. 584–591
Hou YC, Chang CY, Tu SF (2001) Visual cryptography for color images based on halftone technology. In: Proceedings of international conference on information systems, analysis and synthesis (world multiconference on systemics, cybernetics and informatics)
Hou YC (2003) Visual cryptography for color images. Pattern Recognit 36:1619–1629
Hou YC, Xu CS (2003) A probability-based optimization model for sharing multiple secret images without pixel expansion. J Inf Technol Soc 2:19–38
Hou YC, Tu CF (2004) Visual cryptography techniques for colour images without pixel expansion. J Inf Technol Soc 1:95–110
Hou YC, Tu SF (2005) A visual cryptographic technique for chromatic images using multi-pixel encoding method. J Res Pract Infor Technol 37(2):179–191
Hsu HC, Chen TS, Lin YH (2004) The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. Netw Sens Control 2:996–1001
Ito R, Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE transactions on fundamentals of electronics, communications and computer sciences. E82-A(10), 2172–2177
Jin D (2003) Progressive color visual cryptography (Masters Thesis). National University of Singapore, Singapore
Katoh T, Imai H (1996) An extended construction method for visual secret sharing schemes. IEICE Trans J79–A(8):1344–1351
Kobara K, Imai H (1996) Limiting the visible space visual secret sharing schemes and their application to human identification. Springer, Berlin, pp 185–195 ASIACRYPT ’96. LNCS
Koga H (2002) A general formula of the \((t, n)\)-threshold visual secret sharing scheme. Springer, Berlin, pp 328–345 LNCS 2501 (ASIACRYPT ’02)
Krause M, Simon HU (2003) Determining the optimal contrast for secret sharing schemes in visual cryptography. Comb Probab Comput 12(3):285–299
Kuwakado H, Tanaka H (2004) Size-reduced visual secret sharing scheme. IEICE Trans Fundam E87–A(5):1193–1197
Lin CH (2002) Visual cryptography for color images with image size invariable shares (Masters Thesis). National Central University, Taiwan
Lin SJ, Chen SK, Lin JC (2010) Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J Vis Commun Image Represent 21(8):900–916
Liu F, Wu CK, Lin XJ (2009) The alignment problem of visual cryptography schemes. Des Codes Cryptogr 50(2):215–227
Liu F, Wu CK, Lin XJ (2010) A new definition of the contrast of visual cryptography scheme. Inf Process Lett 110:241–246
Liu F, Wu CK, Lin XJ (2010) Step construction of visual cryptography schemes. IEEE Trans Inf Forensics Secur 5(1):27–38
Liu F, Wu CK (2011) Embedded meaningful share visual cryptography schemes. IEEE Trans Inf Forensics Secur 6(2):307–322
Monoth T, Anto B (2010) Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput Sci 2:143–148
Naor M, Shamir A (1995) Visual cryptography. Springer, Berlin, pp 1–12 LNCS 950 (EUROCRYPT ’94)
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Shyu SJ (2006) Efficient visual secret sharing scheme for color images. Pattern Recognit 39(5):866–880
Shyu SJ, Huang SY, Lee YK, Wang RZ, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recognit 40(12):3633–3651
Shyu SJ (2007) Image encryption by random grids. Pattern Recognit 40:1014–1031
Surekha B, Swamy G, Rao KS (2010) A multiple watermarking technique for images based on visual cryptography. Comput Appl 1:77–81
Viet DQ, Kurosawa K (2004) Almost ideal contrast visual cryptography with reversing. In Topics in Cryptology - CT-RSA. Springer, Berlin, pp 353–365
Weir J, Yan W (2010) A comprehensive study of visual cryptography. transactions on data hiding and multimedia security. Springer, Berlin
Weir J, Yan W (2009) Sharing multiple secrets using visual cryptography. In IEEE international symposium on circuits and systems (ISCAS’09). 509–512
Weir J, Yan W (2010) Resolution variant visual cryptography for street view of Google maps. In IEEE international symposium on circuits and systems (ISCAS’10)
Wu XY, Wong DS, Li Q (2009) Threshold visual cryptography scheme for color images with no pixel expansion. In: Proceedings of the second symposium international computer science and computational technology (ISCSCT’09). 310–315
Wu HC, Chang CC (2005) Sharing visual multi-secrets using circle shares. Comput Stand Interfaces 28:123–135
Wu C, Chen L (1998) A study on visual cryptography (Masters Thesis). National Chiao Tung University, Taiwan
Yan W, Duo J, Kankanhalli MS (2004) Visual cryptography for print and scan applications. In : Proceedings of IEEE international symposium on circuits and systems (ISCAS’04), Canada. 572–575
Yang CN, Laih CS (2000) New coloured visual secret sharing schemes. Des. Codes Cryptogr. 20:325–335
Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recognit Lett 25:481–494
Yang CN, Chen TS (2005) Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recognit Lett 26:193–206
Yang CN, Chen TS (2005) Size-adjustable visual secret sharing schemes. IEICE Trans Fundam E88–A(9):2471–2474
Yang CN, Chen TS (2006) New size-reduced visual secret sharing schemes with half reduction of shadow size. IEICE Trans Fundam E89–A(2):620–625
Yang CN, Chen TS (2006) Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recognit 39:1300–1314
Yang CN, Chen TS (2007) Extended visual secret sharing schemes: improving the shadow image quality. Int J Pattern Recognit Artif Intell 21(5):879–898
Yang CN, Chen TS (2007) Visual secret sharing scheme: prioritizing the secret pixels with different pixel expansions to enhance the image contrast. Opt Eng 46(9):097005
Zhou Z, Arce GR, Crescenzo GD (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453
Zhu BS, Wu JK, Kankanhalli MS (2003) Print signatures for document authentication. In: Proceedings of ACM conference on computer and communications security. 145–153
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Liu, F., Yan, W.Q. (2014). Various Problems in Visual Cryptography. In: Visual Cryptography for Image Processing and Security. Springer, Cham. https://doi.org/10.1007/978-3-319-09644-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-09644-5_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09643-8
Online ISBN: 978-3-319-09644-5
eBook Packages: Computer ScienceComputer Science (R0)