Contrast Optimization for Size Invariant Visual Cryptography Scheme

被引:6
作者
Wu, Xiaotian [1 ,2 ]
Fang, Jia [1 ,2 ]
Yan, Wei Qi [3 ]
机构
[1] Jinan Univ, Guangdong Key Lab Data Secur & Privacy Preserving, Guangzhou 510632, Peoples R China
[2] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Peoples R China
[3] Auckland Univ Technol, Dept Comp Sci, Auckland 1010, New Zealand
基金
中国国家自然科学基金;
关键词
Secret sharing; visual cryptography; contrast; optimization; size invariant; SECRET SHARING SCHEMES; IMAGE ENCRYPTION;
D O I
10.1109/TIP.2023.3263101
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Visual cryptography scheme (VCS) serves as an effective tool in image security. Size-invariant VCS (SI-VCS) can solve the pixel expansion problem in traditional VCS. On the other hand, it is anticipated that the contrast of the recovered image in SI-VCS should be as high as possible. The investigation of contrast optimization for SI-VCS is carried out in this article. We develop an approach to optimize the contrast by stacking t ( k <= t <= n) shadows in (k, n)-SI-VCS. Generally, a contrastmaximizing problem is linked with a (k, n)-SI-VCS, where the contrast by t shadows is considered as an objective function. An ideal contrast by t shadows can be produced by addressing this problem using linear programming. However, there exist (n- k+1) different contrasts in a ( k, n) scheme. An optimizationbased design is further introduced to provide multiple optimal contrasts. These (n - k + 1) different contrasts are regarded as objective functions and it is transformed into a multi-contrastmaximizing problem. The ideal point method and lexicographic method are adopted to address this problem. Additionally, if the Boolean XOR operation is used for secret recovery, a technique is also provided to offer multiple maximum contrasts. The effectiveness of the proposed schemes is verified by extensive experiments. Comparisons illustrate significant advancement on contrast is provided.
引用
收藏
页码:2174 / 2189
页数:16
相关论文
共 47 条
[1]   Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing [J].
Bao, Long ;
Yi, Shuang ;
Zhou, Yicong .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2017, 26 (12) :5618-5631
[2]   On the contrast in visual cryptography schemes [J].
Blundo, C ;
De Santis, A ;
Stinson, DR .
JOURNAL OF CRYPTOLOGY, 1999, 12 (04) :261-289
[3]   Contrast optimal threshold visual cryptography schemes [J].
Blundo, C ;
D'Arco, P ;
De Santis, A ;
Stinson, DR .
SIAM JOURNAL ON DISCRETE MATHEMATICS, 2003, 16 (02) :224-261
[4]   Threshold visual secret sharing by random grids [J].
Chen, Tzung-Her ;
Tsao, Kai-Hsiang .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (07) :1197-1208
[5]   Visual secret sharing by random grids revisited [J].
Chen, Tzung-Her ;
Tsao, Kai-Hsiang .
PATTERN RECOGNITION, 2009, 42 (09) :2203-2217
[6]   Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images [J].
Chuman, Tatsuya ;
Sirichotedumrong, Warit ;
Kiya, Hitoshi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) :1515-1525
[7]   Probabilistic visual cryptography schemes [J].
Cimato, S ;
De Prisco, R ;
De Santis, A .
COMPUTER JOURNAL, 2006, 49 (01) :97-107
[8]   Color visual cryptography schemes for black and white secret images [J].
De Prisco, Roberto ;
De Santis, Alfredo .
THEORETICAL COMPUTER SCIENCE, 2013, 510 :62-86
[9]   Perfect recovery of XOR-based visual cryptography scheme [J].
Fu, Zhengxin ;
Cheng, Yuqiao ;
Yu, Bin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (02) :2367-2384
[10]   Reversible Data Hiding Based on Dual Pairwise Prediction-Error Expansion [J].
He, Wenguang ;
Cai, Zhanchuan .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2021, 30 :5045-5055