Progressive Visual Cryptography with Unexpanded Shares

被引:83
作者
Hou, Young-Chang [1 ]
Quan, Zen-Yu [2 ]
机构
[1] Tamkang Univ, Dept Informat Management, Taipei 251, Taiwan
[2] Natl Cent Univ, Dept Informat Management, Chungli 320, Taiwan
关键词
Progressive visual cryptography; secret sharing; visual cryptography; SIZE;
D O I
10.1109/TCSVT.2011.2106291
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The basic (k, n)-threshold visual cryptography (VC) scheme is to share a secret image with n participants. The secret image can be recovered while stacking k or more shares obtained; but we will get nothing if there are less than k pieces of shares being overlapped. On the contrary, progressive VC can be utilized to recover the secret image gradually by superimposing more and more shares. If we only have a few pieces of shares, we could get an outline of the secret image; by increasing the number of the shares being stacked, the details of the hidden information can be revealed progressively. Previous research, such as Jin et al. in 2005, and Fang and Lin in 2006, were all based upon pixel-expansion, which not only causes the waste of storage space and transmission time but also gets a poor visual quality on the stacked image. Furthermore, Fang and Lin's research had a severe security problem that will disclose the secret information on each share. In this letter, we proposed a brand new sharing scheme of progressive VC to produce pixel-unexpanded shares. In our research, the possibility for either black or white pixels of the secret image to appear as black pixels on the shares is the same, which approximates to 1/n. Therefore, no one can obtain any hidden information from a single share, hence ensures the security. When superimposing k (sheets of share), the possibility for the white pixels being stacked into black pixels remains 1/n, while the possibility rises to k/n for the black pixels, which sharpens the contrast of the stacked image and the hidden information, therefore, become more and more obvious. After superimposing all of the shares, the contrast rises to (n - 1)/n which is apparently better than the traditional ways that can only obtain 50% of contrast, consequently, a clearer recovered image can be achieved.
引用
收藏
页码:1760 / 1764
页数:5
相关论文
共 14 条
  • [1] Visual cryptography for general access structures
    Ateniese, G
    Blundo, C
    DeSantis, A
    Stinson, DR
    [J]. INFORMATION AND COMPUTATION, 1996, 129 (02) : 86 - 106
  • [2] Fault-tolerant and progressive transmission of images
    Chen, SK
    Lin, JC
    [J]. PATTERN RECOGNITION, 2005, 38 (12) : 2466 - 2471
  • [3] Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels
    Eisen, PA
    Stinson, DR
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2002, 25 (01) : 15 - 61
  • [4] Fang WP, 2007, ELE COM ENG, P108
  • [5] Fang Wen-Pinn, 2006, [Pattern Recognition and Image Analysis (Advances in Mathematical Theory and Applications), Pattern Recognition and Image Analysis. (Advances in Mathematical Theory and Applications)], V16, P632
  • [6] Visual cryptography for color images
    Hou, YC
    [J]. PATTERN RECOGNITION, 2003, 36 (07) : 1619 - 1629
  • [7] Hou YC, 2001, PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON IMAGING SCIENCE, SYSTEMS AND TECHNOLOGY, VOLS I AND II, P239
  • [8] Ito R, 1999, IEICE T FUND ELECTR, VE82A, P2172
  • [9] Progressive color visual cryptography
    Jin, D
    Yan, WQ
    Kankanhalli, MS
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2005, 14 (03) : 1 - 13
  • [10] Naor M., 1995, LECT NOTES COMPUTER, V950, P1, DOI [10.1007/BFb0053419, DOI 10.1007/BFB0053419]