A high contrast and capacity efficient visual cryptography scheme for the encryption of multiple secret images

被引:16
作者
Lee, Kai-Hui [2 ]
Chiu, Pei-Ling [1 ]
机构
[1] Ming Chuan Univ, Dept Risk Management & Insurance, Taipei 111, Taiwan
[2] Ming Chuan Univ, Dept Comp Sci & Informat Engn, Taipei 111, Taiwan
关键词
Visual secret share scheme; Pixel expansion; Visual secret sharing scheme for multiple secrets; SHARING SCHEME;
D O I
10.1016/j.optcom.2011.01.077
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The visual secret sharing for multiple secrets (VSSM) allows for the encryption of a greater number of secret images into a given image area. Previous researches on VSSM schemes incur a very serious pixel expansion that will damage capable of increasing the capacity of secret image encryption. Moreover, the most of VSSM schemes will decrease the contrast of recover images while the amount of secret image encryption increases. These drawbacks limit applicability of the existing VSSM schemes. In this paper, we propose a highly efficient encryption algorithm to cope with this problem. The proposed algorithm adopts a novel hybrid encryption approach that includes a VC-based encryption and a camouflaging process. The experimental results demonstrate that the proposed approach not only can increase the capacity efficient for VSSM schemes, but also maintains an excellent level of contrast in the recovered secret images. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:2730 / 2741
页数:12
相关论文
共 25 条
[1]   Visual cryptography for grey level images [J].
Blundo, C ;
De Santis, A ;
Naor, M .
INFORMATION PROCESSING LETTERS, 2000, 75 (06) :255-259
[2]  
CHEN TH, 2008, P 8 INT C INT SYST D, P252, DOI DOI 10.1109/ISDA.2008.141
[3]  
CHOU YP, 2008, J CHIN INST ENG, V7, P1180
[4]   A new multi-secret images sharing scheme using Largrange's interpolation [J].
Feng, JB ;
Wu, HC ;
Tsai, CS ;
Chu, YP .
JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 76 (03) :327-339
[5]   Visual secret sharing for multiple secrets [J].
Feng, Jen-Bang ;
Wu, Hsien-Chu ;
Tsai, Chwei-Shyong ;
Chang, Ya-Fen ;
Chu, Yen-Ping .
PATTERN RECOGNITION, 2008, 41 (12) :3572-3581
[6]  
HORN SJ, 2008, COMPUT SECUR, V3, P84
[7]  
Horng SJ, 2008, COMPUT SYST SCI ENG, V23, P209
[8]   A novel intrusion detection system based on hierarchical clustering and support vector machines [J].
Horng, Shi-Jinn ;
Su, Ming-Yang ;
Chen, Yuan-Hsin ;
Kao, Tzong-Wann ;
Chen, Rong-Jian ;
Lai, Jui-Lin ;
Perkasa, Citra Dwi .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (01) :306-313
[9]   Visual cryptography for color images [J].
Hou, YC .
PATTERN RECOGNITION, 2003, 36 (07) :1619-1629
[10]  
Hsu H.-C., 2004, P IEEE INT C NETW SE, P996