Skip to main content

ESSVCS: An Enriched Secret Sharing Visual Cryptography

  • Chapter
Transactions on Data Hiding and Multimedia Security IX

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 8363))

Abstract

Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that are able to be stacked together so as to approximately recover the original image. VC is a unique technique in the sense that the encrypted message can be decrypted directly by the Human Visual System (HVS). The distinguishing characteristic of VC is the ability of secret restoration without the use of computation. However because of restrictions of the HVS, pixel expansion and alignment problems, a VC scheme perhaps can only be applied to share a small size of secret image. In this paper, we propose a general method to let the VC shares carry more secrets, the technique is to use cypher output of private-key systems as the input random numbers of VC scheme, meanwhile the encryption key could be shared, the shared keys could be associated with the VC shares. After this operation, VC scheme and secret sharing scheme are merged with the private-key system. Under this design, we implement a (k,t,n)-VC scheme. Compared to those existing schemes, our approach could greatly enhance the ability of current VC schemes and could cope with pretty rich secrets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  2. Surekha, B., Swamy, G., Rao, K.S.: A multiple watermarking technique for images based on visual cryptography. Computer Applications 1, 77–81 (2010)

    Google Scholar 

  3. Monoth, T., Anto, B., Tamperproof, P.: transmission of fingerprints using visual cryptography schemes. Procedia Computer Science 2, 143–148 (2010)

    Article  Google Scholar 

  4. Weir, J., Yan, W.: Resolution variant visual cryptography for street view of google maps. In: Proceedings of the ISCAS, pp. 1695–1698 (2010)

    Google Scholar 

  5. Yang, C.N., Chen, T.S., Ching, M.H.: Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme. Integrated Computer-Aided Engineering 13(2), 189–199 (2006)

    Google Scholar 

  6. Weir, J., Yan, W.: A comprehensive study of visual cryptography. In: Shi, Y.Q. (ed.) Transactions on DHMS V. LNCS, vol. 6010, pp. 70–105. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. Cimato, S., Yang, C.N.: Visual cryptography and secret image sharing. CRC Press, Taylor & Francis (2011)

    Google Scholar 

  8. Weir, J.P., Yan, W.: Visual Cryptography and Its Applications. Ventus Publishing Aps (2012)

    Google Scholar 

  9. Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Designs, Codes and Cryptography 50, 215–227 (2009)

    Article  MathSciNet  Google Scholar 

  10. Yan, W.Q., Jin, D., Kankanhalli, M.S.: Visual cryptography for print and scan applications. In: Proceedings of the 2004 International Symposium on Circuits and Systems, vol. 5, pp. 572–575 (2004)

    Google Scholar 

  11. Iwamoto, M., Yamamoto, H.: A construction method of visual secret sharing schemes for plural secret images. IEICE Transactions on Fundamentals E86-A(10), 2577–2588 (2003)

    Google Scholar 

  12. Droste, S.: New results on visual cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401–415. Springer, Heidelberg (1996)

    Google Scholar 

  13. Iwamoto, M., Lei, W., Yoneyama, K., Kunihiro, N., Ohta, K.: Visual secret sharing schemes for multiple secret images allowing the rotation of shares. IEICE Transactions on Fundamentals E89-A(5), 1382–1395 (2006)

    Google Scholar 

  14. Yang, C.N., Laih, C.S.: New colored visual secret sharing schemes. Designs, Codes and Cryptography 20, 325–335 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  15. Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. Journal of Electronic Imaging 14(3), 033019 (2005)

    Google Scholar 

  16. Shyu, S.J.: Efficient visual secret sharing scheme for color images. Pattern Recognition 39, 866–880 (2006)

    Article  MATH  Google Scholar 

  17. Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  18. Lin, S.J., Lin, J.C.: VCPSS a two in one two decoding options image sharing method combining visual cryptography (VC) and polynomial style sharing PSS approaches. Pattern Recognition 40, 3652–3666 (2007)

    Article  MATH  Google Scholar 

  19. Yang, C.N., Ciou, C.B.: Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability. Image and Vision Computing 28, 1600–1610 (2010)

    Article  Google Scholar 

  20. Li, P., Ma, P.J., Su, X.H., Yang, C.N.: Improvements of a two-in-one image secret sharing scheme based on gray mixing model. Journal of Visual Communication and Image Representation 23(3), 441–453 (2012)

    Article  Google Scholar 

  21. Fang, W.P., Lin, J.C.: Visual cryptography with extra ability of hiding confidential data. Journal of Electronic Imaging 15(2), 023020 (2006)

    Google Scholar 

  22. Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. Journal of Cryptology 12(4), 261–289 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  23. Koga, H.: A general formula of the (t,n)-threshold visual secret sharing scheme. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 328–345. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  24. Ehrsam, W.F., Meyer, C.H.W., Smith, J.L., Tuchman, W.L.: Message verification and transmission error detection by block chaining (1976)

    Google Scholar 

  25. Soto, J., Bassham, L.: Randomness testing of the advanced encryption standard finalist candidates. In: Proceedings AES3, New York (2001), http://csrc.nist.gov/publications/nistir/ir6483.pdf

  26. Blundo, C., De Bonis, A., De Santis, A.: Improved schemes for visual cryptography. Designs, Codes and Cryptography 24, 255–278 (2001)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Liu, F., Yan, W.Q., Li, P., Wu, C. (2014). ESSVCS: An Enriched Secret Sharing Visual Cryptography. In: Shi, Y.Q., Liu, F., Yan, W. (eds) Transactions on Data Hiding and Multimedia Security IX. Lecture Notes in Computer Science, vol 8363. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55046-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-55046-1_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-55045-4

  • Online ISBN: 978-3-642-55046-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics