Abstract
Halftone visual cryptography (HVC) is a technique to share secret image into a group of halftone shadows with pleasing visual quality. However, pixel expansion problem is serious in existing HVC schemes. In this paper, a random grid-based HVC scheme is proposed to solve this problem. The proposed method adopts complementary shares to prevent non-relevant information from showing on the decoded image. The size of halftone share generated by the proposed scheme is the same as the original secret image. Extensive experimental results are provided, demonstrating the effectiveness and advantages of the proposed schemes.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Naor, M., Shamir, A.: Visual cryptography. Lect. Notes Comput. Sci. 950(1), 1–12 (1995)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)
Hofmeister, T., Krause, M., Simon, H.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Comput. Comb. 176–185 (1997)
Blundo, C., De Santis, A., Stinson, D.: On the contrast in visual cryptography schemes. J. Cryptology 12(4), 261–289 (1999)
Blundo, C., De Santis, A., Naor, M.: Visual cryptography for grey level images. Inf. Process. Lett. 75(6), 255–259 (2000)
Shyu, S.: Efficient visual secret sharing scheme for color images. Pattern Recogn. 39(5), 866–880 (2006)
Ateniese, G., Blundo, C., Santis, A., Stinson, D.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250(1–2), 143–161 (2001)
Zhou, Z., Arce, G., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)
Wang, Z., Arce, G., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383 (2009)
Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377–379 (1987)
Chen, T., Tsao, K.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 1197–1208 (2011)
Wu, X., Sun, W.: Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J. Syst. Softw. 85(5), 1119–1134 (2011)
Wu, X., Sun, W.: Visual secret sharing for general access structures by random grids. IET Inf. Secur. 6(4), 299–309 (2012)
Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Signal Process. 93(5), 977–995 (2013)
Wu, X., Liu, T., Sun, W.: Improving the visual quality of random grid-based visual secret sharing via error diffusion. J. Vis. Commun. Image Represent. 24(5), 552–566 (2013)
Wu, X., Sun, W.: Generalized random grid and its applications in visual cryptography. IEEE Trans. Inf. Forensics Secur. 8(9), 1541–1553 (2013)
Ulichney, R., et al.: The void-and-cluster method for dither array generation. In: Proceedings of SPIE, vol. 1913, pp. 332–343 (1993)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Liang, Z., Yang, M. (2014). Improved Halftone Visual Cryptography by Random Grids. In: Patnaik, S., Li, X. (eds) Proceedings of International Conference on Computer Science and Information Technology. Advances in Intelligent Systems and Computing, vol 255. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1759-6_20
Download citation
DOI: https://doi.org/10.1007/978-81-322-1759-6_20
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1758-9
Online ISBN: 978-81-322-1759-6
eBook Packages: EngineeringEngineering (R0)