Abstract
With visual cryptography in mind, the security property of a new scheme is always one of main concerns. However, the ideal security is not taken into account in some visual cryptography schemes sharing multiple secrets. In this paper, the security of a multi-secret visual cryptography scheme proposed by Feng et al. is analyzed. We show that the security of their scheme is not ideal. Precisely, it is insecure since some information of the secret images can be inferred by block attacking the second share alone. In order to realize the ideal security, we redesign the visual patterns and the rule of random permutation. Moreover, the proposed ideal secure scheme has better pixel expansion and relative difference. Finally, we give some experimental results and comparisons to show the effectiveness of the proposed scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Shamir, A.: How to share a secret. Communications of the ACM 22, 612–613 (1979)
Blakley, G.R.: Safeguarding cryptographic keys. In: Merwin, R.E., Zanca, J.T., Smith, M. (eds.) National Computer Conference, vol. 48, pp. 242–268. IEEE Press, New York (1979)
Ateniese, G., Blundo, C., Santis, A., De, S.D.R.: Visual cryptography for general access structures. Information and Computation 129, 86–106 (1996)
Hsu, C.S., Tu, S.F., Hou, Y.C.: An optimization model for visual cryptography schemes with unexpanded shares. In: Esposito, F., Raś, Z.W., Malerba, D., Semeraro, G. (eds.) ISMIS 2006. LNCS (LNAI), vol. 4203, pp. 58–67. Springer, Heidelberg (2006)
Liu, F., Wu, C., Lin, X.: Step construction of visual cryptography schemes. IEEE T. Inf. Foren. Sec. 5, 27–38 (2010)
Shyu, S.J., Chen, M.C.: Optimum pixel expansions for threshold visual secret sharing schemes. IEEE T. Inf. Foren. Sec. 6, 960–969 (2011)
Yang, C.N., Wang, C.C., Chen, T.S.: Visual cryptography schemes with reversing. The Computer Journal bxm118, 1–13 (2008)
Lin, C.C., Tai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters 24, 349–358 (2003)
Cimato, S., Prisco, R.D., Santis, A.D.: Optimal colored threshold visual cryptography schemes. Designs, Codes and Cryptography 35, 311–335 (2005)
Yang, C.N., Chen, T.S.: Colored visual cryptography scheme based on additive color mixing. Pattern Recognition 41, 3114–3129 (2008)
Ng, F.Y., Wong, D.S.: On the security of a visual cryptography scheme for color images. Pattern Recognition 42, 929–940 (2009)
Chen, L.H., Wu, C.C.: A study on visual cryptography. Master Thesis, National Chiao Tung University, Taiwan (1998)
Wu, H.C., Chang, C.C.: Sharing visual multi-secrets using circle shares. Computer Standards & Interfaces 28, 123–135 (2005)
Shyong, J.S., Huang, S.Y., Lee, Y.K., Wang, R.Z.: Sharing multiple secrets in visual cryptography. Pattern Recognition 40, 3633–3651 (2007)
Hsu, H.C., Chen, T.S., Lin, Y.H.: The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. In: Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, pp. 996–1001. IEEE Press, New York (2004)
Feng, J.B., Wub, H.C., Tsaic, C.S., Chud, Y.P.: Visual secret sharing for multiple secrets. Pattern Recognition 41, 3572–3581 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Fu, Zx., Yu, B. (2014). Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares. In: Shi, Y.Q., Liu, F., Yan, W. (eds) Transactions on Data Hiding and Multimedia Security IX. Lecture Notes in Computer Science, vol 8363. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55046-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-55046-1_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55045-4
Online ISBN: 978-3-642-55046-1
eBook Packages: Computer ScienceComputer Science (R0)