Advertisement

Random Grids-Based Threshold Visual Secret Sharing with Improved Visual Quality

  • Xuehu YanEmail author
  • Yuliang Lu
  • Lintao Liu
  • Song Wan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10082)

Abstract

Visual secret sharing (VSS) by random grids (RG) has gained much attention since it avoids the pixel expansion problem as well as requires no codebook design. However, most of the previous RG-based threshold VSS still suffer from low visual quality or worse reconstructed secrets when more shares are stacked. In this paper, a new RG-based VSS with improved visual quality is proposed. The random bits are utilized to improve the visual quality as well as to decrease the darkness of the reconstructed secret image in the proposed scheme. Experimental results and analyses show the effectiveness of the proposed scheme.

Keywords

Visual cryptography Visual secret sharing Random grids Contrast Progressive evaluation 

Notes

Acknowledgement

The authors would like to thank the anonymous reviewers for their valuable comments. This work is supported by the National Natural Science Foundation of China (Grant Number: 61602491).

References

  1. 1.
    Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). doi: 10.1007/BFb0053419 Google Scholar
  2. 2.
    Weir, J., Yan, W.Q.: A comprehensive study of visual cryptography. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security V. LNCS, vol. 6010, pp. 70–105. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-14298-7_5 CrossRefGoogle Scholar
  3. 3.
    Yan, X., Wang, S., El-Latif, A.A.A., Niu, X.: Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery. Multimedia Tools Appl., 1–22 (2013)Google Scholar
  4. 4.
    Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4), 481–494 (2004)CrossRefGoogle Scholar
  5. 5.
    Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2006)CrossRefGoogle Scholar
  6. 6.
    Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on Boolean operations. Pattern Recognit. 40(10), 2776–2785 (2007)CrossRefzbMATHGoogle Scholar
  7. 7.
    Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383–396 (2009)CrossRefGoogle Scholar
  8. 8.
    Li, P., Ma, P.J., Su, X.H., Yang, C.N.: Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Visual Commun. Image Represent. 23(3), 441–453 (2012)CrossRefGoogle Scholar
  9. 9.
    Yan, X., Wang, S., El-Latif, A.A.A., Niu, X.: Random grids-based visual secret sharing with improved visual quality via error diffusion. Multimedia Tools Appl., 1–18 (2014)Google Scholar
  10. 10.
    Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 82(10), 2172–2177 (1999)Google Scholar
  11. 11.
    De Prisco, R., De Santis, A.: On the relation of random grid and deterministic visual cryptography. IEEE Trans. Inf. Forensics Secur. 9(3–4), 653–665 (2014)CrossRefGoogle Scholar
  12. 12.
    Yang, C.N., Wu, C.C., Wang, D.S.: A discussion on the relationship between probabilistic visual cryptography and random grid. Inf. Sci. 278, 141–173 (2014)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Fu, Z., Yu, B.: Visual cryptography and random grids schemes. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 109–122. Springer, Heidelberg (2014). doi: 10.1007/978-3-662-43886-2_8 Google Scholar
  14. 14.
    Wu, X., Sun, W.: Extended capabilities for XOR-based visual cryptography. IEEE Trans. Inf. Forensics Secur. 9(10), 1592–1605 (2014)CrossRefGoogle Scholar
  15. 15.
    Yan, X., Liu, X., Yang, C.N.: An enhanced threshold visual secret sharing based on random grids. J. Real-Time Image Process., 1–13 (2015)Google Scholar
  16. 16.
    Wu, X., Sun, W.: Improved tagged visual cryptography by random grids. Signal Process. 97, 64–82 (2014)CrossRefGoogle Scholar
  17. 17.
    Lee, Y.S., Wang, B.J., Chen, T.H.: Quality-improved threshold visual secret sharing scheme by random grids. Image Process. IET 7(2), 137–143 (2013)MathSciNetCrossRefGoogle Scholar
  18. 18.
    Yan, X., Wang, S., Niu, X.: Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Process. 105, 389–398 (2014)CrossRefGoogle Scholar
  19. 19.
    Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377–379 (1987)CrossRefGoogle Scholar
  20. 20.
    Shyu, S.J.: Image encryption by multiple random grids. Pattern Recogn. 42, 1582–1596 (2009)CrossRefzbMATHGoogle Scholar
  21. 21.
    Guo, T., Liu, F., Wu, C.: K out of K extended visual cryptography scheme by random grids. Signal Process. 94, 90–101 (2014)CrossRefGoogle Scholar
  22. 22.
    Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84(7), 1197–1208 (2011)CrossRefGoogle Scholar
  23. 23.
    Guo, T., Liu, F., Wu, C.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86(8), 2094–2109 (2013)CrossRefGoogle Scholar
  24. 24.
    Shyu, S.J.: Image encryption by random grids. Pattern Recogn. 40(3), 1014–1031 (2007)CrossRefzbMATHGoogle Scholar
  25. 25.
    Hou, Y.C., Quan, Z.Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. Circ. Syst. Video Tech. 21(11), 1760–1764 (2011)CrossRefGoogle Scholar
  26. 26.
    Yan, X., Wang, S., Niu, X.: Threshold progressive visual cryptography construction with unexpanded shares. Multimedia Tools Appl., 1–18 (2015)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Hefei Electronic Engineering InstituteHefeiChina

Personalised recommendations