Skip to main content

K-N Secrete Sharing Scheme of Visual Cryptography for Hiding Image Using 2 × 2 Blocks Replacement

  • Conference paper
  • First Online:
Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing

Abstract

Visual cryptography is a method offering a plan which uses pictures circulated as shares in such a way that when the shares are stacked, a sensitive or secrete image is uncovered. According to extended visual cryptography, the offer pictures are built to hold the scattered images together, simultaneously opening a way to assist biometric security and visual cryptography methods. In this paper, we entail a proposal for halftone pictures that beautify the nature of the shares to come about from secrete image and to regain the secret picture in an extended visual cryptography plan for which the figure size of the secret pictures and the reconstructed picture by stacking shares is similar with respect to the first halftone secret picture. The ensuing plan upholds the ideal security of the first developed visual cryptography approach. This process includes 2 × 2 block replacement for generating shares from secrete image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: EUROCRYPT’94 Proceedings, Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer (1995)

    Google Scholar 

  2. Ross, A., Othman, A.A.: Visual Cryptography for Biometric Privacy. IEEE Trans. Inf. Forensics Secur. 6(1), 70–81 (2011)

    Article  Google Scholar 

  3. Askari, N., Moloney, C., Heys, H.M.: A Novel Visual Secret Sharing Scheme Without Image Size Expansion. In: IEEE Canadian Conference on Electrical and ComputerEngineering (CCECE), Montreal, pp. 1–4 (2012)

    Google Scholar 

  4. Hwang, K.F., Chang, C.C.: Recent Development of Visual Cryptography, Intelligent Watermarking Techniques, pp. 459–480. World Scientific Publishing Company (2004)

    Google Scholar 

  5. Stinson, D.: Visual cryptography and threshold schemes. Dr. Dobb’s J. 36–43 (1998)

    Google Scholar 

  6. BorkoFurht, EdinMuharemagic, Socek, Daniel: Visual and Audio Secret Sharing, pp. 163–192. Multimedia Encryption and Watermarking, Springer (2005)

    Google Scholar 

  7. Zhou, Z., Arce, G.R., Crescenzo, G.Di.: Halftone visual cryptography. IEEE Trans. Image Process. 15, 8 (2006)

    Google Scholar 

  8. Hsu, C.-Y., Lu, C.-S., Pei, S.-C.: Joint Screening Halftoning and VisualCryptography for Image Protection. LNCS 4283, pp. 212–225. Springer, Berlin (2006)

    Google Scholar 

  9. Walden, D.E.: A Benchmarking Assessment of Known Visual Cryptography algorithms. B.S.M.E. Thesis, Chester F. Carlson Center for Imaging Science Rochester Institute of Technology, Valparaiso University, New York, 16 May 2012

    Google Scholar 

  10. Horng, G., Chen, T., Tasi, D.S.: Cheating in Visual Cryptography, Designs, Codes and Cryptography, pp. 219–236 (2006)

    Google Scholar 

  11. Shih, F.Y.: Digital Watermarking and Steganography Fundamentals and Techniques, CRC Press, Taylor & Francis Group (2008)

    Google Scholar 

  12. Yang, C.-N., Yang, Y.-Y., Chen, T.-S., Ye, G.-C.: New steganography scheme in halftone images. In: Proceedings of the IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1520–1523 (2008)

    Google Scholar 

  13. S., Cimato, De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Information Processing Letters 93(4), 199–206 (2005)

    Google Scholar 

  14. Noar, N., Shamir, A.: Visual cryptography. In: Advances in Cryptology: Eurocrypt’94, pp. 1–12. Spring, Berlin, Germany (1995)

    Google Scholar 

  15. Lin, C.-C., Tsai, W.-H.: Viaual Cryptography for Gray-Level Images the 13th IPPR Conference on Computer Vision, Graphic and Image processing, pp. 221–226 (2000)

    Google Scholar 

  16. Ateniese, Giuseppe, Blundo, Carlo, De Santis, Alfredo, Stinson, Douglas R.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250, 143–161 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  17. Naor, M., Shamir, A.:Visual cryptography. In: Proceedings of Advances in Cryptology, EUROCRYPT 94, Lecture Notes in ComputerScience, vol. 950, p. 112 (1995)

    Google Scholar 

  18. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250, 143–161 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  19. Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2451 (2006)

    Article  Google Scholar 

  20. Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. In: Proceedings of WSCG, pp. 303–310 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashish Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Ashish Sharma, Srivastava, D.K. (2016). K-N Secrete Sharing Scheme of Visual Cryptography for Hiding Image Using 2 × 2 Blocks Replacement. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_58

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2638-3_58

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2636-9

  • Online ISBN: 978-81-322-2638-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics