Advertisement

Secure Masks for Visual Cryptography

  • Jonathan Weir
  • WeiQi Yan
Chapter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6010)

Abstract

Visual cryptography provides a very powerful technique by which one secret can be distributed into two or more pieces known as shares. When the shares are printed on transparencies and then superimposed exactly together, the original secret can be recovered without computer participation. In this paper, we take multiple secrets into consideration and generate a key share for all the secrets; correspondingly, we share each secret using this key share. The secrets are recovered when the key is superimposed on the combined share in different locations using the proposed scheme. Also discussed and illustrated within this paper is how to embed a share of visual cryptography into halftone and colour images. The remaining share is used as a key share in order to perform the decryption. It is also worth noting that no information regarding the secrets is leaked in any of our proposed schemes. We provide the corresponding results in this paper.

Keywords

Secret Image Visual Cryptography Halftone Image Internet Explorer Pixel Expansion 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1994)CrossRefGoogle Scholar
  2. 2.
    Khan, D.: The Codebreakers: The Story of Secret Writing. Macmillan Publishing Co., New York (1967)Google Scholar
  3. 3.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York (1995)Google Scholar
  4. 4.
    Kang, H.R.: Digital Color Halftoning. In: Society of Photo-Optical Instrumentation Engineers (SPIE), Bellingham, WA, USA (1999)Google Scholar
  5. 5.
    Hou, Y.C.: Visual cryptography for color images. Pattern Recognition 36, 1619–1629 (2003)CrossRefGoogle Scholar
  6. 6.
    Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Transactions on Image Processing 15(8), 2441–2453 (2006)CrossRefGoogle Scholar
  7. 7.
    Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended Schemes for Visual Cryptography. Theoretical Computer Science 250, 1–16 (1996)Google Scholar
  8. 8.
    Myodo, E., Sakazawa, S., Takishima, Y.: Visual cryptography based on void-and-cluster halftoning technique. In: ICIP, pp. 97–100 (2006)Google Scholar
  9. 9.
    Myodo, E., Takagi, K., Miyaji, S., Takishima, Y.: Halftone visual cryptography embedding a natural grayscale image based on error diffusion technique. In: ICME, pp. 2114–2117 (2007)Google Scholar
  10. 10.
    Wang, Z., Arce, G.R.: Halftone visual cryptography through error diffusion. In: ICIP, pp. 109–112 (2006)Google Scholar
  11. 11.
    Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theoretical Computer Science 250(1-2), 143–161 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  12. 12.
    Lau, D.L., Arce, G.R.: Modern Digital Halftoning. Marcel Dekker, New York (2000)Google Scholar
  13. 13.
    Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. In: WSCG, pp. 303–310 (2002)Google Scholar
  14. 14.
    Zhang, Y.: Space-filling curve ordered dither. Computers & Graphics 22(4), 559–563 (1998)CrossRefGoogle Scholar
  15. 15.
    Lin, C.C., Tsai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters 24(1-3), 349–358 (2003)CrossRefGoogle Scholar
  16. 16.
    Koga, H., Yamamoto, H.: Proposal of a Lattice-Based Visual Secret Sharing Scheme for Color and Grey-Scale Images. IEICE Transation Fundamentals E81-A(6), 1262–1269 (1998)Google Scholar
  17. 17.
    Hou, Y.C., Chang, C.Y., Tu, S.F.: Visual cryptography for color images based on halftone technology. Image, Acoustic, Speech and Signal Processing, Part 2 (2001)Google Scholar
  18. 18.
    Prakash, N.K., Govindaraju, S.: Visual secret sharing schemes for color images using halftoning. In: Proceedings of the International Conference on Computational Intelligence and Multimedia Applications, ICCIMA 2007, Washington, DC, USA, pp. 174–178. IEEE Computer Society, Los Alamitos (2007)CrossRefGoogle Scholar
  19. 19.
    Chang, C.C., Lin, C.C., Lin, C.H., Chen, Y.H.: A novel secret image sharing scheme in color images using small shadow images. Information Sciences 178(11), 2433–2447 (2008)CrossRefMathSciNetGoogle Scholar
  20. 20.
    Yang, C.N., Chen, T.S.: New size-reduced visual secret sharing schemes with half reduction of shadow size. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005, Part I. LNCS, vol. 3480, pp. 19–28. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  21. 21.
    Wu, C., Chen, L.: A study on visual cryptography. Master’s thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C. (1998)Google Scholar
  22. 22.
    Wu, H.C., Chang, C.C.: Sharing visual multi-secrets using circle shares. Computer Standards & Interfaces 28, 123–135 (2005)CrossRefGoogle Scholar
  23. 23.
    Hsu, H.C., Chen, T.S., Lin, Y.H.: The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. Networking, Sensing and Control 2, 996–1001 (2004)Google Scholar
  24. 24.
    Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognition 40(12), 3633–3651 (2007)zbMATHCrossRefGoogle Scholar
  25. 25.
    Shyu, S.J.: Efficient visual secret sharing scheme for color images. Pattern Recognition 39(5), 866–880 (2006)zbMATHCrossRefGoogle Scholar
  26. 26.
    Chuang, S.C., Huang, C.H., Wu, J.L.: Unseen visible watermarking. In: Proceedings of International Conference on Image Processing, San Antonio, USA, pp. 261–264 (2007)Google Scholar
  27. 27.
    Hersch, R.D., Chosson, S.: Band moiré images. In: ACM SIGGRAPH, pp. 239–247. ACM, New York (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Jonathan Weir
    • 1
  • WeiQi Yan
    • 1
  1. 1.Queen’s University BelfastBelfastUK

Personalised recommendations