Skip to main content

Improved Halftone Visual Cryptography by Random Grids

  • Conference paper
  • 964 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 255))

Abstract

Halftone visual cryptography (HVC) is a technique to share secret image into a group of halftone shadows with pleasing visual quality. However, pixel expansion problem is serious in existing HVC schemes. In this paper, a random grid-based HVC scheme is proposed to solve this problem. The proposed method adopts complementary shares to prevent non-relevant information from showing on the decoded image. The size of halftone share generated by the proposed scheme is the same as the original secret image. Extensive experimental results are provided, demonstrating the effectiveness and advantages of the proposed schemes.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Naor, M., Shamir, A.: Visual cryptography. Lect. Notes Comput. Sci. 950(1), 1–12 (1995)

    Article  MathSciNet  Google Scholar 

  2. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)

    Article  MATH  Google Scholar 

  3. Hofmeister, T., Krause, M., Simon, H.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Comput. Comb. 176–185 (1997)

    Google Scholar 

  4. Blundo, C., De Santis, A., Stinson, D.: On the contrast in visual cryptography schemes. J. Cryptology 12(4), 261–289 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  5. Blundo, C., De Santis, A., Naor, M.: Visual cryptography for grey level images. Inf. Process. Lett. 75(6), 255–259 (2000)

    Article  Google Scholar 

  6. Shyu, S.: Efficient visual secret sharing scheme for color images. Pattern Recogn. 39(5), 866–880 (2006)

    Article  MATH  Google Scholar 

  7. Ateniese, G., Blundo, C., Santis, A., Stinson, D.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250(1–2), 143–161 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  8. Zhou, Z., Arce, G., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)

    Article  Google Scholar 

  9. Wang, Z., Arce, G., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383 (2009)

    Google Scholar 

  10. Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377–379 (1987)

    Article  Google Scholar 

  11. Chen, T., Tsao, K.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 1197–1208 (2011)

    Article  Google Scholar 

  12. Wu, X., Sun, W.: Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J. Syst. Softw. 85(5), 1119–1134 (2011)

    Article  Google Scholar 

  13. Wu, X., Sun, W.: Visual secret sharing for general access structures by random grids. IET Inf. Secur. 6(4), 299–309 (2012)

    Article  MathSciNet  Google Scholar 

  14. Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Signal Process. 93(5), 977–995 (2013)

    Article  Google Scholar 

  15. Wu, X., Liu, T., Sun, W.: Improving the visual quality of random grid-based visual secret sharing via error diffusion. J. Vis. Commun. Image Represent. 24(5), 552–566 (2013)

    Article  Google Scholar 

  16. Wu, X., Sun, W.: Generalized random grid and its applications in visual cryptography. IEEE Trans. Inf. Forensics Secur. 8(9), 1541–1553 (2013)

    Article  MathSciNet  Google Scholar 

  17. Ulichney, R., et al.: The void-and-cluster method for dither array generation. In: Proceedings of SPIE, vol. 1913, pp. 332–343 (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhuoqian Liang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Liang, Z., Yang, M. (2014). Improved Halftone Visual Cryptography by Random Grids. In: Patnaik, S., Li, X. (eds) Proceedings of International Conference on Computer Science and Information Technology. Advances in Intelligent Systems and Computing, vol 255. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1759-6_20

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1759-6_20

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1758-9

  • Online ISBN: 978-81-322-1759-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics