Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique

被引:13
作者
Lee, Jung-San [1 ]
Chang, Chin-Chen [1 ,2 ]
Ngoc-Tu Huynh [1 ,4 ]
Tsai, Hsin-Yi [3 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[3] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30013, Taiwan
[4] Univ Danang, Coll Informat Technol, Danang, Vietnam
关键词
Visual secret sharing; Visual cryptography; Pixel expansion; User-friendly; CRYPTOGRAPHY; SCHEMES;
D O I
10.1016/j.dsp.2015.02.012
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Traditional secret sharing scheme that encrypts secret image based on mathematical calculation to construct shadows often requires the complicated computation to extract the secret. Later on, conventional visual cryptography scheme was developed to deal with the perplexed calculation in encryption and extraction of previous schemes. The stack-to-see technique can be used easily to reveal the secret by human visual system, which can shorten computation time. However, the expansion of image size and the noise-liked shares of previous schemes lead to the difficulty in transmission and storage. This study uses a pre-defined codebook to encode two secret images into two meaningful transparencies without pixel expansion. According to the turning mechanism, two secret images can be embedded into two shares simultaneously. The decryption process allows the user to get two secrets via turning and stacking. A notable feature of our scheme is that the black pixel value of the secret image can be completely extracted and the vision quality of stacking results can be identified clearly. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:131 / 139
页数:9
相关论文
共 18 条
[1]   Efficient multi-secret image sharing based on Boolean operations [J].
Chen, Tzung-Her ;
Wu, Chang-Sian .
SIGNAL PROCESSING, 2011, 91 (01) :90-97
[2]   Colored visual cryptography without color darkening [J].
Cimato, S. ;
De Prisco, R. ;
De Santis, A. .
THEORETICAL COMPUTER SCIENCE, 2007, 374 (1-3) :261-276
[3]   Friendly progressive visual secret sharing [J].
Fang, Wen-Pinn .
PATTERN RECOGNITION, 2008, 41 (04) :1410-1414
[4]   Progressive Visual Cryptography with Unexpanded Shares [J].
Hou, Young-Chang ;
Quan, Zen-Yu .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2011, 21 (11) :1760-1764
[5]   Progressive color visual cryptography [J].
Jin, D ;
Yan, WQ ;
Kankanhalli, MS .
JOURNAL OF ELECTRONIC IMAGING, 2005, 14 (03) :1-13
[6]   A high contrast and capacity efficient visual cryptography scheme for the encryption of multiple secret images [J].
Lee, Kai-Hui ;
Chiu, Pei-Ling .
OPTICS COMMUNICATIONS, 2011, 284 (12) :2730-2741
[7]   VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches [J].
Lin, Sian-Jheng ;
Lin, Ja-Chen .
PATTERN RECOGNITION, 2007, 40 (12) :3652-3666
[8]   Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion [J].
Lin, Sian-Jheng ;
Chen, Shang-Kuan ;
Lin, Ja-Chen .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2010, 21 (08) :900-916
[9]   Colour visual cryptography schemes [J].
Liu, F. ;
Wu, C. K. ;
Lin, X. J. .
IET Information Security, 2008, 2 (04) :151-165
[10]   A new definition of the contrast of visual cryptography scheme [J].
Liu, Feng ;
Wu, ChuanKun ;
Lin, XiJun .
INFORMATION PROCESSING LETTERS, 2010, 110 (07) :241-246