Progressive color visual cryptography

被引:89
作者
Jin, D [1 ]
Yan, WQ [1 ]
Kankanhalli, MS [1 ]
机构
[1] Natl Univ Singapore, Sch Comp, Singapore 117543, Singapore
关键词
D O I
10.1117/1.1993625
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Visual cryptography is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that can be stacked together to approximately recover the original image. Unfortunately, it has not been used much primarily because the decryption process entails a severe degradation in image quality in terms of loss of resolution and contrast. Its usage is also hampered by the lack of proper techniques for handling grayscale and color images. We develop a novel technique that enables visual cryptography of color as well as gray-scale images. With the use of halftoning and a novel microblock encoding scheme, the technique has a unique flexibility that enables a single encryption of a color image but enables three types of decryptions on the same ciphertext. The three different types of decryptions enable the recovery of the image of varying qualities. The physical transparency stacking type of decryption enables the recovery of the traditional visual cryptography quality image. An enhanced stacking technique enables the decryption into a halftone quality image. Finally, a computation-based decryption scheme makes the perfect recovery of the original image possible. Based on this basic scheme, we establish a progressive mechanism to share color images at multiple resolutions. We extract shares from each resolution layer to construct a hierarchical structure; the images of different resolutions can then be restored by stacking the different shared images together Thus, our technique enables flexible decryption. We implement our technique and present results. (c) 2005 SPIE and IS&T.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 18 条
  • [1] ATENIESE ADS, 1996, LECT NOTES COMPUTER, V1099, P416
  • [2] Extended capabilities for visual cryptography
    Ateniese, G
    Blundo, C
    De Santis, A
    Stinson, DR
    [J]. THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) : 143 - 161
  • [3] Contrast optimal threshold visual cryptography schemes
    Blundo, C
    D'Arco, P
    De Santis, A
    Stinson, DR
    [J]. SIAM JOURNAL ON DISCRETE MATHEMATICS, 2003, 16 (02) : 224 - 261
  • [4] Hybrid LMS-MMSE inverse halftoning technique
    Chang, PC
    Yu, CS
    Lee, TH
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (01) : 95 - 103
  • [5] DESMEDT Y, 2000, P 7 ACM C COMP COMM, P116
  • [6] Gnanaguruparan M, 2002, CRYPTOLOGIA, V26, P68, DOI 10.1080/0161-110291890768
  • [7] HOU YC, 2001, P INT C INF SYST AN, V13, P441
  • [8] KANG HR, 1999, SPIE IEE SERIES IMAG
  • [9] Lau D.L., 2001, MODERN DIGITAL HALFT
  • [10] Visual cryptography based on an interferometric encryption technique
    Lee, SS
    Na, JC
    Sohn, SW
    Park, C
    Seo, DH
    Kim, SJ
    [J]. ETRI JOURNAL, 2002, 24 (05) : 373 - 380