Skip to main content

Various Color Schemes of Visual Cryptography

  • Chapter
  • First Online:
  • 949 Accesses

Abstract

Color visual cryptography makes things become real. In this chapter, we start from the basic color models and introduce multiple ways to present the color content using visual cryptographic techniques. Two visual shares of a color image could be superimposed together and the color secret could be restored using this simple operation. Color visual cryptography schemes open the door for applications and make the visual cryptography to be widely applied.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129:86–106

    Article  MATH  Google Scholar 

  2. Ateniese G, Blundo C, Santis AD, Stinson DR (2001) Extended capabilities for visual cryptography. ACM Theor Comput Sci 250(1–2):143–161

    Article  MATH  Google Scholar 

  3. Biham E, Itzkovitz A (1997) Visual cryptography with polarization. In: CRYPTO ’98

    Google Scholar 

  4. Blundo C, Santis A, Stinson DR (1999) On the contrast in visual cryptography schemes. J Crypt 12(4):261–289

    Article  MATH  Google Scholar 

  5. Blundo C, Bonis A, Santis A (2001) Improved schemes for visual cryptography. Des Codes Crypt 24:255–278

    Article  MATH  Google Scholar 

  6. Blundo C, D’Arco P, Santis A, Stinson DR (2003) Contrast optimal threshold visual cryptography schemes. SIAM J Discrete Math 16(2):224–261

    Article  MATH  MathSciNet  Google Scholar 

  7. Bose M, Mukerjee R (2010) Optimal \((k, n)\) visual cryptographic schemes for general \(k\). Des Codes Crypt 55:19–35

    Article  MATH  MathSciNet  Google Scholar 

  8. Chang CY (2000) Visual cryptography for color images. Masters Thesis, National Central University, Taiwan

    Google Scholar 

  9. Chen TH, Tsao KH, Wei KC (2008) Multiple-image encryption by rotating random grids. In: International conference on intelligent systems design and applications, vol 3, pp 252–256

    Google Scholar 

  10. Chen YF, Chan YK, Huang CC, Tsai MH, Chu YP (2007) A multiple-level visual secret-sharing scheme without image size expansion. Inf Sci 177:4696–4710

    Article  MATH  MathSciNet  Google Scholar 

  11. Cimato S, Prisco R, Santis A (2005) Optimal colored threshold visual cryptography schemes. Des Codes Crypt 35:311–335

    Article  MATH  Google Scholar 

  12. Cimato S, Prisco RD, Santis AD (2006) Probabilistic visual cryptography schemes. Comput. J. 49(1):97–107

    Article  Google Scholar 

  13. Cimato S, Prisco RD, Santis AD (2007) Colored visual cryptography without color darkening. Theor Comput Sci 374(1):261–276

    Article  MATH  Google Scholar 

  14. Cimato S, Yang CN (2011) Visual cryptography and secret image sharing. CRC Press, Taylor & Francis, Boca Raton

    Google Scholar 

  15. Degara-Quintela N, Perez-Gonzalez F (2003) Visible encryption: using paper as a secure channel, security and watermarking of multimedia contents. In: Proceedings of SPIE’03 2003, vol 5020

    Google Scholar 

  16. Droste S (1996) New results on visual cryptography. In: CRYPTO’96, vol 1109. Springer, Berlin, pp 401–415

    Google Scholar 

  17. Fang WP (2009) Non-expansion visual secret sharing in reversible style. Int J Comput Sci Netw Secur 9(2):204–208

    Google Scholar 

  18. Floyd RW, Steinberg L (1976) An adaptive algorithm for spatial grey scale. In: Proceedings of the society of information display, vol 17, pp 75–77

    Google Scholar 

  19. Hou YC, Chang CY, Lin F (1999) Visual cryptography for colour images based on colour decomposition. In: Proceedings of 5th conference on information management, pp 584–591

    Google Scholar 

  20. Hou YC, Chang CY, Tu SF (2001) Visual cryptography for color images based on halftone technology. In: Proceedings of international conference on information systems, analysis and synthesis (World Multiconference on Systemics, Cybernetics and Informatics)

    Google Scholar 

  21. Hou YC (2003) Visual cryptography for color images. Pattern Recognit 36:1619–1629

    Article  Google Scholar 

  22. Hou YC, Xu CS (2004) A probability-based optimization model for sharing multiple secret images without pixel expansion. J Inf Technol Soc 1:95–110

    Google Scholar 

  23. Hou YC, Tu CF (2004) Visual cryptography techniques for colour images without pixel expansion. J Inf Technol Soc 1:95–110

    Google Scholar 

  24. Hou YC, Tu SF (2005) A visual cryptographic technique for chromatic images using multi-pixel encoding method. J Res Pract Inf Technol 37(2):179–191

    Google Scholar 

  25. Hsu HC, Chen TS, Lin YH (2004) The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. Netw Sens Control 2:996–1001

    Google Scholar 

  26. Ishihara T, Koga H (2003) A visual secret sharing scheme for color images based on mean value-color mixing. IEICE Trans Fundam E86–A:194–197

    Google Scholar 

  27. Ito R, Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE Trans Fundam Elect Commun Comput Sci E82–A(10):2172–2177

    Google Scholar 

  28. Jin D (2003) Progressive color visual cryptography. Masters Thesis, National University of Singapore, Singapore

    Google Scholar 

  29. Katoh T, Imai H (1996) An extended construction method for visual secret sharing schemes. IEICE Trans J79–A(8):1344–1351

    Google Scholar 

  30. Kobara K, Imai H (1996) Limiting the visible space visual secret sharing schemes and their application to human identification. In: ASIACRYPT ’96. LNCS, 1163, Springer, pp 185–195

    Google Scholar 

  31. Koga H, Iwamoto M, Yamamoto H (2001) An analytic construction of the visual secret sharing scheme for color images. IEICE Trans Fundam 1:262–272

    Google Scholar 

  32. Koga H, Yamamoto H (1998) Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images. IEICE Trans Fundam 6:1262–1269

    Google Scholar 

  33. Koga H (2002) A general formula of the \((t, n)\)-threshold visual secret sharing scheme. In: LNCS 2501 (ASIACRYPT ’02), Springer, pp 328–345

    Google Scholar 

  34. Krause M, Hu S (2003) Determining the optimal contrast for secret sharing schemes in visual cryptography. Comb Probab Comput 12(3):285–299

    Article  MATH  Google Scholar 

  35. Kuwakado H, Tanaka H (2004) Size-reduced visual secret sharing scheme. IEICE Trans Fundam E87–A(5):1193–1197

    Google Scholar 

  36. Lin CH (2002) Visual cryptography for color images with image size invariable shares. Masters Thesis, National Central University, Taiwan

    Google Scholar 

  37. Lukac R, Plataniostis KN (2004) Color image secret sharing. IEE Electron Lett 40(9):529–530

    Article  Google Scholar 

  38. Naor M, Shamir A (1995) Visual cryptography. In: LNCS 950 (EUROCRYPT ’94), pp 1–12

    Google Scholar 

  39. Nakajima M, Yamaguchi Y (2002) Extended visual cryptography for natural images. In: WSCG conference, pp 303–412

    Google Scholar 

  40. Shyu SJ (2006) Efficient visual secret sharing scheme for color images. Pattern Recognit 39(5):866–880

    Article  MATH  Google Scholar 

  41. Tuyls P, Hollman HDL, Van Lint JH, Tolhuizen L (2005) XOR-based visual cryptography schemes. Des Codes Crypt 37:169–186

    Article  MATH  Google Scholar 

  42. Viet DQ, Kurosawa K (2004) Almost ideal contrast visual cryptography with reversing. In: Topics in cryptology - CT-RSA, pp 353–365

    Google Scholar 

  43. Weir J, Yan WA (2010) Comprehensive study of visual cryptography. Transactions on Data Hiding and Multimedia Security. Springer, Berlin

    Google Scholar 

  44. Wu C, Chen L A (1998) Study on visual cryptography. Masters Thesis, National Chiao Tung University, Taiwan

    Google Scholar 

  45. Wu XY, Wong DS, Li Q (2009) Threshold visual cryptography scheme for color images with no pixel expansion. In: Proceedings of the second symposium international computer science and computational technology (ISCSCT’09), pp 310–315

    Google Scholar 

  46. Yang CN, Laih CS (2000) New coloured visual secret sharing schemes. Des Codes Crypt 20:325–335

    Article  MATH  MathSciNet  Google Scholar 

  47. Yang CN, Chen TS (2008) Colored visual cryptography scheme based on additive color mixing. Pattern Recognit 41(10):3114–3129

    Article  MATH  Google Scholar 

  48. Zhou Z, Arce GR, Crescenzo GD (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Feng Liu .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Liu, F., Yan, W.Q. (2014). Various Color Schemes of Visual Cryptography. In: Visual Cryptography for Image Processing and Security. Springer, Cham. https://doi.org/10.1007/978-3-319-09644-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09644-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09643-8

  • Online ISBN: 978-3-319-09644-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics