Advertisement

Halftone Visual Cryptography with Complementary Cover Images

  • Gang ShenEmail author
  • Feng Liu
  • Zhengxin Fu
  • Bin Yu
  • Wen Wang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10082)

Abstract

By the addition of halftone techniques, halftone visual cryptography scheme (HVCS) embeds a secret image into halftone shares taking meaningful visual information. In this paper, we propose a (kn)-HVCS using complementary cover images. Before the halftone processing of the cover images by error diffusion, secret information pixels (SIPs) are prefixed based on the underlying (kn)-VCS. In the halftone processing, several pairs of complementary cover images are adopted and two halftone methods on the cover images are designed for different (kn) threshold access structures. The proposed scheme removes the share’s cross interference from other shares and obtains better visual quality. Furthermore, the proposed scheme eliminates the burden that each participant may carry multiple shares.

Keywords

Visual cryptography Visual secret sharing Extended visual cryptography Halftone visual cryptography Meaningful shares 

Notes

Acknowledgments

We would like to thank the anonymous reviewers for their important and helpful comments. This work was supported by the National Natural Science Foundation of China with No. 61602513 and No. 61671448, the Strategic Priority Research Program of the Chinese Academy of Sciences with No. XDA06010701, and the National Key R&D Program of China with No. 2016YFB0800100.

References

  1. 1.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. ACM Theor. Comput. Sci. 250, 143–161 (2001)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Droste, S.: New results on visual cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401–415. Springer, Heidelberg (1996). doi: 10.1007/3-540-68697-5_30 Google Scholar
  3. 3.
    Liu, F., Wu, C.K.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6, 307–322 (2011)CrossRefGoogle Scholar
  4. 4.
    Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. In: WSCG 2002, pp. 303–412. CSRN, Plzen (2002)Google Scholar
  5. 5.
    Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). doi: 10.1007/BFb0053419 Google Scholar
  6. 6.
    Tsai, D.S., Chen, T., Horng, G.: On generating meaningful shares in visual secret sharing scheme. Imaging Sci. J. 56, 49–55 (2008)CrossRefGoogle Scholar
  7. 7.
    Ulichney, R.A.: The void-and-cluster method for dither array generation. In: Human Vision, Visual Processing, and Digital Display IV, San Jose, CA, vol. 1913, pp. 332–343. SPIE (1993)Google Scholar
  8. 8.
    Wang, D.S., Yi, F., Li, X.: On general construction for extended visual cryptography schemes. Pattern Recogn. 42, 3071–3082 (2009)CrossRefzbMATHGoogle Scholar
  9. 9.
    Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4, 383–396 (2009)CrossRefGoogle Scholar
  10. 10.
    Yan, X.H., Shen, W., Niu, X.M., Yang, C.N.: Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Digital Sig. Process. 38, 53–65 (2015)CrossRefGoogle Scholar
  11. 11.
    Yang, C.N., Yang, Y.Y.: New extended visual cryptography schemes with clearer shadow images. Inf. Sci. 271, 246–263 (2014)MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15, 2441–2453 (2006)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Gang Shen
    • 1
    Email author
  • Feng Liu
    • 2
    • 3
  • Zhengxin Fu
    • 1
  • Bin Yu
    • 1
  • Wen Wang
    • 2
  1. 1.Zhengzhou Information Science and Technology InstituteZhengzhouChina
  2. 2.State Key Laboratory of Information SecurityInstitute of Information Engineering, Chinese Academy of SciencesBeijingChina
  3. 3.School of Cyber SecurityUniversity of Chinese Academy of SciencesBeijingChina

Personalised recommendations