Lock and Key Share-based Random Grid Visual Secret Sharing Scheme for Grayscale and Color Images with Two Decoding Options

被引:0
作者
Rabari, Dipak K. [1 ]
Meghrajani, Yogesh K. [1 ]
机构
[1] Dharmsinh Desai Univ, Dept Elect & Commun Engn, Fac Technol, Nadiad 387001, Gujarat, India
来源
2017 ISEA ASIA SECURITY AND PRIVACY CONFERENCE (ISEASP 2017) | 2017年
关键词
Visual secret sharing; lock and key share; OR-based and XOR-based decryption; halftone; color image; CRYPTOGRAPHY; ALGORITHM; XOR;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Grayscale and color images enlarge the area of visual secret sharing scheme. Conventional (2, n) random grid visual secret sharing (RG-VSS) scheme encrypts the secret image into n noise-like share images, called as shares. This scheme generates n shares with equal priorities; thus, decrypts the secret image by stacking any two shares. Recently, concept of two-tier (2, m, n) lock and key share RG-VSS scheme is established to enhance the security of conventional RG-VSS scheme. (2, m, n) scheme generates shares using binary secret image and splits into m lock and n key shares group. The secret image is disclosed only when at least one share is present from each group. The secret image can be revealed using OR-based and XOR-based decryptions. This paper extends the (2, m, n) RG-VSS scheme for grayscale and color images with two decoding option. When the computational device is not available, user gets the preview of the secret information by stacking the shares. User obtains improved visual quality of secret image when computational device is available. Experimental results exhibit the efficiency of the proposed scheme.
引用
收藏
页码:85 / 89
页数:5
相关论文
共 25 条
[1]   A Lock and Key Share (2, m, n) Random Grid Visual Secret Sharing Scheme with XOR and OR Decryptions [J].
Ahammed, T. Farzin ;
Mundekkattil, Sulaiman .
COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 :393-402
[2]  
Alsmirat M. A., 2016, MULTIMED TOOLS APPL, P1
[3]   Automated wireless video surveillance: an evaluation framework [J].
Alsmirat, Mohammad A. ;
Jararweh, Yaser ;
Obaidat, Islam ;
Gupta, Brij B. .
JOURNAL OF REAL-TIME IMAGE PROCESSING, 2017, 13 (03) :527-546
[4]  
[Anonymous], 1981, The Art of Computer Programming
[5]   Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain [J].
Atawneh, Samer ;
Almomani, Ammar ;
Al Bazar, Hussein ;
Sumari, Putra ;
Gupta, Brij .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (18) :18451-18472
[6]   Threshold visual secret sharing by random grids [J].
Chen, Tzung-Her ;
Tsao, Kai-Hsiang .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (07) :1197-1208
[7]   Visual secret sharing by random grids revisited [J].
Chen, Tzung-Her ;
Tsao, Kai-Hsiang .
PATTERN RECOGNITION, 2009, 42 (09) :2203-2217
[8]   Comment on "Cheating Prevention in Visual Cryptography" [J].
Chen, Yu-Chi ;
Horng, Gwoboa ;
Tsai, Du-Shiau .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (07) :3319-3323
[9]   Progressive Visual Cryptography with Unexpanded Shares [J].
Hou, Young-Chang ;
Quan, Zen-Yu .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2011, 21 (11) :1760-1764
[10]   ENCRYPTION OF PICTURES AND SHAPES BY RANDOM GRIDS [J].
KAFRI, O ;
KEREN, E .
OPTICS LETTERS, 1987, 12 (06) :377-379