Novel visual cryptography schemes without pixel expansion for halftone images

被引:7
作者
Askari, Nazanin [1 ]
Heys, Howard M. [2 ]
Moloney, Cecilia R. [2 ]
机构
[1] Stantec, St. John's, A1B 0L2, NL
[2] Department of Electrical and Computer Engineering, Memorial University of Newfoundland, St. John's, A1B 3X5, NL
来源
| 1600年 / IEEE Canada卷 / 37期
基金
加拿大自然科学与工程研究理事会;
关键词
Cryptography; grayscale halftoning; image processing; secret sharing; visual cryptography (VC);
D O I
10.1109/CJECE.2014.2333419
中图分类号
学科分类号
摘要
Visual cryptography (VC) is a secret-sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed. While VC was developed for application to binary images, and is inherently based on binary logical operations, it can be applied to grayscale images through their halftone representations. In this paper, we present a new method for processing halftone images that improves the quality of recovered secret images in a VC scheme. Notably, our approach mitigates the two traditional problems in VC of pixel expansion and loss of contrast. Based on this processing stage, this paper proposes and demonstrates the results of two applications of VC on halftone images, one application in multiple VC, and the second in extended VC. Both applications function without pixel expansion, with enhanced visual quality of the recovered secret image over earlier approaches in the literature, while also maintaining perfect security of the original VC approach. © 2014 IEEE.
引用
收藏
页码:168 / 177
页数:9
相关论文
共 12 条
  • [1] Naor M., Shamir A., Visual cryptography, Eurocrypt'94, 950, pp. 1-12, (1995)
  • [2] Ross A., Othman A.A., Visual cryptography for biometric privacy, IEEE Trans. Inf. Forensics Security, 6, 1, pp. 70-81, (2011)
  • [3] Askari N., Moloney C., Heys H.M., A novel visual secret sharing scheme without image size expansion, Proc. 25th IEEE Canadian Conf. Electr. Comput. Eng. (CCECE), pp. 1-4, (2012)
  • [4] Wu C.C., Chen L.H., A Study on Visual Cryptography, (1998)
  • [5] Feng J.B., Wu G.C., Tsai C.S., Chang Y.F., Chu Y.P., Visual secret sharing for multiple secrets, Pattern Recognit., 41, 12, pp. 3572-3581, (2008)
  • [6] Wu H.C., Chang C.C., Sharing visual multi-secrets using circle shares, Comput. Standards Inter., 28, 1, pp. 123-135, (2005)
  • [7] Ateniese G., Blundo C., De Santis A., Stinson D.R., Extended capabilities for visual cryptography, Theoretical Comput. Sci., 250, 1-2, pp. 143-161, (2001)
  • [8] Floyd R.W., Steinberg L., An adaptive algorithm for spatial gray scale, Proc. Soc. Inform. Display, 17, 2, pp. 75-77, (1976)
  • [9] Zhou Z., Arce G.R., Crescenzo G.D., Halftone visual cryptography, IEEE Trans. Image Process, 15, 8, pp. 2441-2453, (2006)
  • [10] Nakajima M., Yamaguchi Y., Extended visual cryptography for natural images, Proc. WSCG, pp. 303-310, (2002)