Abstract
In this chapter, we focus on improving visual quality for extended VC, i.e., VC with meaningful shares. First, we discuss the case with binary secret images and cover images. Then we extend it to halftone cover images, in order to produce share images with better visual quality based on error diffusion. Finally, we extend the design to include a hidden watermark that can serve the authentication purpose.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Adapted by permission from Springer Nature: Springer, Multimedia Tools and Applications, Vol. 75, No. 18, Size-invariant extended visual cryptography with embedded watermark based on error diffusion, Bin Yan et al. ©, 2015.
References
Chen, T.H., Tsao, K.H.: User-friendly random-grid-based visual secret sharing. IEEE Trans. Circuits Syst. Video Technol. 21, 1693–1703 (2011)
Fang, W.P., Lin, J.C.: Visual cryptography with extra ability of hiding confidential data. J. Electron. Imaging 15(2), 1–7 (2006)
Huang, H.C., Fang, W.C.: Authenticity preservation with histogram-based reversible data hiding and quadtree concepts. Sensors 11(10), 9717–9731 (2011)
Huang, H.C., Chang, F.C., Fang, W.C.: Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans. Consum. Electron. 57(2), 779–787 (2011)
Huang, Y.J., Chang, J.D.: Non-expanded visual cryptography scheme with authentication. In: IEEE 2nd International Symposium on Next-Generation Electronics (ISNE), pp. 165–168. IEEE, Taiwan (2013)
Liu, F., Wu, C.K.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307–322 (2011)
Lou, D.C., Chen, H.H., Wu, H.C., Tsai, C.S.: A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares. Displays 32, 118–134 (2011)
Naor, M., Shamir, A.: Visual cryptography. In: Proceeding of the Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT’94), pp. 1–12. Perugia, Italy (1994)
Pang, W.M., Qu, Y., Wong, T.T., Cohen-Or, D., Heng, P.A.: Structure-aware halftoning. ACM Trans. Graph. (SIGGRAPH 2008 issue) 27(3), 89:1–89:8 (2008)
Thajeel, S.A.N., Sulong, G.: A novel approach for detection of copy move forgery using completed robust local binary pattern. J. Inf. Hiding Multimed. Signal Process. 6(2), 351–364 (2015)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Wang, Z.M., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383–396 (2009)
Yan, B., Wang, Y.F., Song, L.Y., Yang, H.M.: Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimed. Tools Appl. 75(18), 11157–11180 (2015)
Yang, C.Y., Wang, W.F., Wang, Y.F., Wang, R.Z.: A simple watermarking scheme with high perceptual quality for still color images based on RWM and centroid. J. Inf. Hiding Multimed. Signal Process. 6(3), 577–590 (2015)
Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Yan, B., Xiang, Y., Hua, G. (2020). Improving Visual Quality for Share Images. In: Improving Image Quality in Visual Cryptography. Signals and Communication Technology. Springer, Singapore. https://doi.org/10.1007/978-981-13-8289-5_4
Download citation
DOI: https://doi.org/10.1007/978-981-13-8289-5_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8288-8
Online ISBN: 978-981-13-8289-5
eBook Packages: EngineeringEngineering (R0)