(2,n) secret sharing scheme for gray and color images based on Boolean operation

被引:5
作者
Dong Lin [1 ]
Wang DaoShun [1 ]
Li ShunDong [2 ]
Dai YiQi [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
基金
中国国家自然科学基金;
关键词
secret sharing scheme; Boolean operation; halftone; contrast; VISUAL CRYPTOGRAPHY;
D O I
10.1007/s11432-011-4302-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional secret sharing (SS) schemes can reconstruct the secret precisely, but have high computation complexity. Visual secret sharing (VSS) schemes use human visual system to reconstruct the secret without cryptographic computation, but have pixel expansion and loss of contrast. Wang et al. proposed a (2,n)-SS scheme for binary images based on Boolean operation, which has low computation complexity, no pixel expansion and the contrast is 1/2. In this paper, we first construct an r runs (2,n)-SS scheme to improve the contrast of Wang at al.'s binary (2,n)-SS scheme. Then we present two approaches to construct r runs (2,n)-SS schemes for grayscale image and color image. The two approaches are both based on Boolean operation, while one approach uses halftone technology and the other uses bit level processing. These proposed schemes have low computation complexity and almost ideal contrast.
引用
收藏
页码:1151 / 1161
页数:11
相关论文
共 14 条
  • [1] Blakley G.R., 1979, INT WORKSH MAN REQ K, DOI [10.1109/MARK.1979.8817296, DOI 10.1109/MARK.1979.8817296]
  • [2] A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy
    Chang, Chin-Chen
    Lin, Chia-Chen
    Le, T. Hoang Ngan
    Le, Hoai Bac
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 184 - +
  • [3] A new probabilistic visual secret sharing scheme for color images
    Chang, Chin-Chen
    Lin, Chia-Chen
    Le, T. Hoang Ngan
    Le, Hoai Bac
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1305 - +
  • [4] SECRET IMAGE SHARING: A BOOLEAN-OPERATIONS-BASED APPROACH COMBINING BENEFITS OF POLYNOMIAL-BASED AND FAST APPROACHES
    Chao, Kun-Yuan
    Lin, Ja-Chen
    [J]. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2009, 23 (02) : 263 - 285
  • [5] Probabilistic visual cryptography schemes
    Cimato, S
    De Prisco, R
    De Santis, A
    [J]. COMPUTER JOURNAL, 2006, 49 (01) : 97 - 107
  • [6] Visual cryptography for color images
    Hou, YC
    [J]. PATTERN RECOGNITION, 2003, 36 (07) : 1619 - 1629
  • [7] Naor M., 1995, LECT NOTES COMPUTER, V950, P1, DOI [10.1007/BFb0053419, DOI 10.1007/BFB0053419]
  • [8] HOW TO SHARE A SECRET
    SHAMIR, A
    [J]. COMMUNICATIONS OF THE ACM, 1979, 22 (11) : 612 - 613
  • [9] Thien CC, 2002, COMPUT GRAPH-UK, V26, P766
  • [10] An image-sharing method with user-friendly shadow images
    Thien, CC
    Lin, JC
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (12) : 1161 - 1169