A (2, 2) Visual Cryptography Technique with Improved Contrast

被引:2
作者
Bhosale, Akshay Gajanan [1 ,2 ]
Patil, Vikram Shripati [3 ]
机构
[1] Shivaji Univ, RIRD, Kolhapur, Maharashtra, India
[2] Sanjay Ghodawat Univ, Dept Elect Engn, Kolhapur, Maharashtra, India
[3] ADCET, Ashta, India
来源
INFORMATION SECURITY JOURNAL | 2020年 / 29卷 / 04期
关键词
Visual cryptography; secret sharing; contrast improvement; SECRET SHARING SCHEME; IMAGE;
D O I
10.1080/19393555.2020.1740840
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptography is a technique used to share a secret among many participants. The problem with visual cryptography technique is that the secret is not perfectly recovered, i.e. a black secret pixel is perfectly recovered but a white secret pixel is recovered with less contrast. Because of this, the overall quality of recovered secret is poor. So to improve the quality of recovered secret image, we need to improve the contrast. In this paper, we have proposed a (2, 2) visual cryptography technique with improved contrast as compared to the traditional (2, 2) visual cryptography scheme (VCS). In the proposed technique, we have used additional basis matrices for encrypting the secret pixels. The quality of the recovered secret image is compared with traditional (2, 2) VCS using various image quality metrics.
引用
收藏
页码:199 / 208
页数:10
相关论文
共 20 条
[1]  
Chaturvedi RN, 2018, 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA)
[2]   Ideal contrast visual cryptography schemes with reversing [J].
Cimato, S ;
De Santis, A ;
Ferrara, AL ;
Masucci, B .
INFORMATION PROCESSING LETTERS, 2005, 93 (04) :199-206
[3]  
Liu F., 2015, VISUAL CRYPTOGRAPHY
[4]   Distance-reciprocal distortion measure for binary document images [J].
Lu, HP ;
Kot, AC ;
Shi, YQ .
IEEE SIGNAL PROCESSING LETTERS, 2004, 11 (02) :228-231
[5]   Randomised visual secret sharing scheme for grey-scale and colour images [J].
Mhala, Nikhil C. ;
Jamal, Rashid ;
Pais, Alwyn R. .
IET IMAGE PROCESSING, 2018, 12 (03) :422-431
[6]   Contrast-Enhanced Visual Cryptography Schemes Based on Additional Pixel Patterns [J].
Monoth, Thomas ;
Anto, Babu P. .
2010 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW 2010), 2010, :171-178
[7]  
Naor M., 1995, WORKSHOP THEORY APPL, V950, P1, DOI 10.1007/BFb0053419
[8]  
Paredes R., 2010, Proceedings 2010 12th International Conference on Frontiers in Handwriting Recognition (ICFHR 2010), P733, DOI 10.1109/ICFHR.2010.119
[9]   Visual cryptography: A brief survey [J].
Punithavathi, P. ;
Geetha, S. .
Information Security Journal, 2017, 26 (06) :305-317
[10]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613