Progressive Visual Cryptography with Unexpanded Meaningful Shares

被引:15
作者
Shivani, Shivendra [1 ]
Agarwal, Suneeta [2 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Allahabad, Uttar Pradesh, India
[2] Natl Inst Technol, Allahabad, Uttar Pradesh, India
关键词
Security; Verification; Algorithms; Progressive visual cryptography; secret sharing; visual cryptography; meaningful shares; unexpanded shares; basis matrix;
D O I
10.1145/2935618
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The traditional k-out-of-n Visual Cryptography (VC) scheme is the conception of "all or nothing" for n participants to share a secret image. The original secret image can be visually revealed only when a subset of k or more shares are superimposed together, but if the number of stacked shares are less than k, nothing will be revealed. On the other hand, a Progressive Visual Cryptography (PVC) scheme differs from the traditional VC with respect to decoding. In PVC, clarity and contrast of the decoded secret image will be increased progressively with the number of stacked shares. Much of the existing state-of-the-art research on PVC has problems with pixel expansion and random pattern of the shares. In this article, a novel scheme of progressive visual cryptography with four or more number of unexpanded as well as meaningful shares has been proposed. For this, a novel and efficient Candidate Block Replacement preprocessing approach and a basis matrix creation algorithm have also been introduced. The proposed method also eliminates many unnecessary encryption constraints like a predefined codebook for encoding and decoding the secret image, restriction on the number of participants, and so on. From the experiments, it is observed that the reconstruction probability of black pixels in the decoded image corresponding to the black pixel in the secret image is always 1, whereas that of white pixels is 0.5 irrespective of the meaningful contents visible in the shares, thus ensuring the value of contrast to alwasys be 50%. Therefore, a reconstructed image can be easily identified by a human visual system without any computation.
引用
收藏
页数:24
相关论文
共 31 条
[1]  
[Anonymous], 2013, 2013 26 IEEE CAN C E, DOI [DOI 10.1109/CCECE.2013.6567726, 10.1109/CCECE.2013.6567726]
[2]   Visual cryptography for general access structures [J].
Ateniese, G ;
Blundo, C ;
DeSantis, A ;
Stinson, DR .
INFORMATION AND COMPUTATION, 1996, 129 (02) :86-106
[3]   Extended capabilities for visual cryptography [J].
Ateniese, G ;
Blundo, C ;
De Santis, A ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) :143-161
[4]   Fault-tolerant and progressive transmission of images [J].
Chen, SK ;
Lin, JC .
PATTERN RECOGNITION, 2005, 38 (12) :2466-2471
[5]   Visual secret sharing by random grids revisited [J].
Chen, Tzung-Her ;
Tsao, Kai-Hsiang .
PATTERN RECOGNITION, 2009, 42 (09) :2203-2217
[6]  
Chou C. L., 2002, TECHNICAL REPORT
[7]   Progressive viewing and sharing of sensitive images [J].
Fang W.-P. ;
Lin J.-C. .
Pattern Recognition and Image Analysis, 2006, 16 (4) :632-636
[8]  
Fang WP, 2007, 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, P519
[9]  
Fang WP, 2007, ELE COM ENG, P108
[10]   Friendly progressive visual secret sharing [J].
Fang, Wen-Pinn .
PATTERN RECOGNITION, 2008, 41 (04) :1410-1414