Skip to main content

A Hierarchical Image Cryptosystem Based on Visual Cryptography and Vector Quantization

  • Conference paper
  • First Online:
Contemporary Advances in Innovative and Applicable Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 812))

Abstract

The meaningless shares generated in visual cryptography scheme may attract hackers during transmission and thus possess a threat that if shares are captured and stacked by hacker, secret image may be revealed. To evade the attention of the hackers, Shamir’s (k, m)—secret sharing scheme may be used to encode the pixels of meaningless share images. The proposed image cryptosystem utilizes a three-dimensional vector quantization method to reduce the encoded data volume, as the Shamir’s scheme increases the size of the encoded data m times. Thus an image cryptosystem based on visual cryptography scheme, that encodes the meaningless shares and also manages the encoded data volume efficiently, is proposed here.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptography: Eurocrypt’94, pp. 1–12. Lecture Notes in Computer Science, Springer (1995)

    Google Scholar 

  2. Jana B., Samanta A., Giri D.: Hierarchical visual secret sharing scheme using steganography. In: Mohapatra R., Chowdhury D., Giri D. (eds) Mathematics and Computing. Springer Proceedings in Mathematics & Statistics, vol 139. Springer, New Delhi (2015)

    Chapter  Google Scholar 

  3. Lin, C.C., Tsai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recogn. Lett. 24, 349–358 (2003)

    Article  Google Scholar 

  4. Blundo, C., Santis, A.D., Naor, M.: Visual cryptography for grey level images. Inf. Process. Lett. 75, 255–259 (2000)

    Article  MathSciNet  Google Scholar 

  5. Patel T., Srivastava R.: Hierarchical visual cryptography for grayscale image. In: Online International Conference on Green Engineering and Technologies (IC-GET), India, 2016

    Google Scholar 

  6. Hou, Y.C.: Visual cryptography for color images. Pattern Recogn. 36, 1619–1629 (2003)

    Article  Google Scholar 

  7. Liu, F., Wu, C.K., Lin, X.J.: Color visual cryptography schemes. IET Inf. Secur. 2, 151–165 (2008)

    Article  Google Scholar 

  8. Shankar, K., Eswaran, P.: RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun. 14(2), 118–130 (2017)

    Article  Google Scholar 

  9. Hou, Y.C., Quan, Z.Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. Circuits Syst. Video Technol. 21(11), 1760–1764 (2010)

    Article  Google Scholar 

  10. Lin T.L., Horng S.J., Lee K.H., Chiu P.L., Kao T.W., Chen Y.H., Run R.S., Lai J.L., Chen R.J.: A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst. Appl. 37, 7858–7869 (2010); Elsevier

    Article  Google Scholar 

  11. Askari, N., Heys, H.M., Moloney, C.R.: Novel visual cryptography schemes without pixel expansion for Halftone images. Can. J. Electr. Comput. Eng. 37(3), 168–177 (2014)

    Article  Google Scholar 

  12. Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. J. WSCG2 10, 303–310 (2002)

    Google Scholar 

  13. Lee, K.H., Chiu, P.L.: Digital image sharing by diverse image media. IEEE Trans. Inf. Forensics Secur. 9(1), 88–98 (2014)

    Article  Google Scholar 

  14. Das S.S., Das Sharma K., Chandra J.K., Bera J.N.: Quantum signal processing-based visual cryptography with unexpanded shares. J. Electr. Imaging, SPIE 24(5), 053026-1–053026-18 (2015)

    Article  Google Scholar 

  15. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  16. Orest V.O., Mircea W.: Improving vector quantization in image compression with Hilbert scan. In: 20th International Conference on Systems, Signals and Image Processing (IWSSIP), Buchtarest, Romania (2013)

    Google Scholar 

  17. http://www.imageprocessingplace.com/downloads_V3/root_downloads/image_databases/standard_test_images.zip. Accessed 7 June 2012

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Surya Sarathi Das .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Das, S.S., Das Sharma, K., Chandra, J.K., Bera, J.N. (2019). A Hierarchical Image Cryptosystem Based on Visual Cryptography and Vector Quantization. In: Mandal, J., Sinha, D., Bandopadhyay, J. (eds) Contemporary Advances in Innovative and Applicable Information Technology. Advances in Intelligent Systems and Computing, vol 812. Springer, Singapore. https://doi.org/10.1007/978-981-13-1540-4_1

Download citation

Publish with us

Policies and ethics