Abstract
The meaningless shares generated in visual cryptography scheme may attract hackers during transmission and thus possess a threat that if shares are captured and stacked by hacker, secret image may be revealed. To evade the attention of the hackers, Shamir’s (k, m)—secret sharing scheme may be used to encode the pixels of meaningless share images. The proposed image cryptosystem utilizes a three-dimensional vector quantization method to reduce the encoded data volume, as the Shamir’s scheme increases the size of the encoded data m times. Thus an image cryptosystem based on visual cryptography scheme, that encodes the meaningless shares and also manages the encoded data volume efficiently, is proposed here.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptography: Eurocrypt’94, pp. 1–12. Lecture Notes in Computer Science, Springer (1995)
Jana B., Samanta A., Giri D.: Hierarchical visual secret sharing scheme using steganography. In: Mohapatra R., Chowdhury D., Giri D. (eds) Mathematics and Computing. Springer Proceedings in Mathematics & Statistics, vol 139. Springer, New Delhi (2015)
Lin, C.C., Tsai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recogn. Lett. 24, 349–358 (2003)
Blundo, C., Santis, A.D., Naor, M.: Visual cryptography for grey level images. Inf. Process. Lett. 75, 255–259 (2000)
Patel T., Srivastava R.: Hierarchical visual cryptography for grayscale image. In: Online International Conference on Green Engineering and Technologies (IC-GET), India, 2016
Hou, Y.C.: Visual cryptography for color images. Pattern Recogn. 36, 1619–1629 (2003)
Liu, F., Wu, C.K., Lin, X.J.: Color visual cryptography schemes. IET Inf. Secur. 2, 151–165 (2008)
Shankar, K., Eswaran, P.: RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun. 14(2), 118–130 (2017)
Hou, Y.C., Quan, Z.Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. Circuits Syst. Video Technol. 21(11), 1760–1764 (2010)
Lin T.L., Horng S.J., Lee K.H., Chiu P.L., Kao T.W., Chen Y.H., Run R.S., Lai J.L., Chen R.J.: A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst. Appl. 37, 7858–7869 (2010); Elsevier
Askari, N., Heys, H.M., Moloney, C.R.: Novel visual cryptography schemes without pixel expansion for Halftone images. Can. J. Electr. Comput. Eng. 37(3), 168–177 (2014)
Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. J. WSCG2 10, 303–310 (2002)
Lee, K.H., Chiu, P.L.: Digital image sharing by diverse image media. IEEE Trans. Inf. Forensics Secur. 9(1), 88–98 (2014)
Das S.S., Das Sharma K., Chandra J.K., Bera J.N.: Quantum signal processing-based visual cryptography with unexpanded shares. J. Electr. Imaging, SPIE 24(5), 053026-1–053026-18 (2015)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Orest V.O., Mircea W.: Improving vector quantization in image compression with Hilbert scan. In: 20th International Conference on Systems, Signals and Image Processing (IWSSIP), Buchtarest, Romania (2013)
http://www.imageprocessingplace.com/downloads_V3/root_downloads/image_databases/standard_test_images.zip. Accessed 7 June 2012
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Das, S.S., Das Sharma, K., Chandra, J.K., Bera, J.N. (2019). A Hierarchical Image Cryptosystem Based on Visual Cryptography and Vector Quantization. In: Mandal, J., Sinha, D., Bandopadhyay, J. (eds) Contemporary Advances in Innovative and Applicable Information Technology. Advances in Intelligent Systems and Computing, vol 812. Springer, Singapore. https://doi.org/10.1007/978-981-13-1540-4_1
Download citation
DOI: https://doi.org/10.1007/978-981-13-1540-4_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1539-8
Online ISBN: 978-981-13-1540-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)