Skip to main content

Improving Visual Quality for Share Images

  • Chapter
  • First Online:
  • 363 Accesses

Part of the book series: Signals and Communication Technology ((SCT))

Abstract

In this chapter, we focus on improving visual quality for extended VC, i.e., VC with meaningful shares. First, we discuss the case with binary secret images and cover images. Then we extend it to halftone cover images, in order to produce share images with better visual quality based on error diffusion. Finally, we extend the design to include a hidden watermark that can serve the authentication purpose.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Adapted by permission from Springer Nature: Springer, Multimedia Tools and Applications, Vol. 75, No. 18, Size-invariant extended visual cryptography with embedded watermark based on error diffusion, Bin Yan et al. ©, 2015.

References

  1. Chen, T.H., Tsao, K.H.: User-friendly random-grid-based visual secret sharing. IEEE Trans. Circuits Syst. Video Technol. 21, 1693–1703 (2011)

    Article  Google Scholar 

  2. Fang, W.P., Lin, J.C.: Visual cryptography with extra ability of hiding confidential data. J. Electron. Imaging 15(2), 1–7 (2006)

    Article  Google Scholar 

  3. Huang, H.C., Fang, W.C.: Authenticity preservation with histogram-based reversible data hiding and quadtree concepts. Sensors 11(10), 9717–9731 (2011)

    Article  Google Scholar 

  4. Huang, H.C., Chang, F.C., Fang, W.C.: Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans. Consum. Electron. 57(2), 779–787 (2011)

    Article  Google Scholar 

  5. Huang, Y.J., Chang, J.D.: Non-expanded visual cryptography scheme with authentication. In: IEEE 2nd International Symposium on Next-Generation Electronics (ISNE), pp. 165–168. IEEE, Taiwan (2013)

    Google Scholar 

  6. Liu, F., Wu, C.K.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307–322 (2011)

    Article  Google Scholar 

  7. Lou, D.C., Chen, H.H., Wu, H.C., Tsai, C.S.: A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares. Displays 32, 118–134 (2011)

    Article  Google Scholar 

  8. Naor, M., Shamir, A.: Visual cryptography. In: Proceeding of the Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT’94), pp. 1–12. Perugia, Italy (1994)

    Google Scholar 

  9. Pang, W.M., Qu, Y., Wong, T.T., Cohen-Or, D., Heng, P.A.: Structure-aware halftoning. ACM Trans. Graph. (SIGGRAPH 2008 issue) 27(3), 89:1–89:8 (2008)

    Google Scholar 

  10. Thajeel, S.A.N., Sulong, G.: A novel approach for detection of copy move forgery using completed robust local binary pattern. J. Inf. Hiding Multimed. Signal Process. 6(2), 351–364 (2015)

    Google Scholar 

  11. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    Article  Google Scholar 

  12. Wang, Z.M., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383–396 (2009)

    Article  Google Scholar 

  13. Yan, B., Wang, Y.F., Song, L.Y., Yang, H.M.: Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimed. Tools Appl. 75(18), 11157–11180 (2015)

    Article  Google Scholar 

  14. Yang, C.Y., Wang, W.F., Wang, Y.F., Wang, R.Z.: A simple watermarking scheme with high perceptual quality for still color images based on RWM and centroid. J. Inf. Hiding Multimed. Signal Process. 6(3), 577–590 (2015)

    MathSciNet  Google Scholar 

  15. Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Xiang .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Yan, B., Xiang, Y., Hua, G. (2020). Improving Visual Quality for Share Images. In: Improving Image Quality in Visual Cryptography. Signals and Communication Technology. Springer, Singapore. https://doi.org/10.1007/978-981-13-8289-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-8289-5_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-8288-8

  • Online ISBN: 978-981-13-8289-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics