Halftone visual cryptography

被引:223
作者
Zhou, Zhi [1 ]
Arce, Gonzalo R.
Di Crescenzo, Giovanni
机构
[1] Univ Delaware, Dept Elect & Comp Engn, Newark, DE 19716 USA
[2] Telcordia Technol Inc, Math Sci Res Ctr, Morristown, NJ 07960 USA
关键词
blue noise halftoning; digital halftoning; digital watermarking; error diffusion; secret sharing; steganography; visual cryptography;
D O I
10.1109/TIP.2006.875249
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Visual cryptography encodes a secret binary image (SI) into n shares of random binary patterns. If the shares are xeroxed onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the n shares, however, have no visual meaning and hinder the objectives of visual cryptography. Extended visual cryptography [1] was proposed recently to construct meaningful binary images as shares using hypergraph colourings, but the visual quality is poor. In this paper, a novel technique named halftone visual cryptography is proposed to achieve visual cryptography via halftoning. Based on the blue-noise dithering principles, the proposed method utilizes the void and cluster algorithm [2]. to encode a secret binary image into n halftone shares (images) carrying significant visual information. The simulation shows that the visual quality of the obtained halftone shares are observably better than that attained by any available visual cryptography method known to date.
引用
收藏
页码:2441 / 2453
页数:13
相关论文
共 18 条
[1]   Visual cryptography for general access structures [J].
Ateniese, G ;
Blundo, C ;
DeSantis, A ;
Stinson, DR .
INFORMATION AND COMPUTATION, 1996, 129 (02) :86-106
[2]   Extended capabilities for visual cryptography [J].
Ateniese, G ;
Blundo, C ;
De Santis, A ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) :143-161
[3]  
ATENIESE G, 1996, P 23 INT C AUT LANG, V1099, P416
[4]   On the contrast in visual cryptography schemes [J].
Blundo, C ;
De Santis, A ;
Stinson, DR .
JOURNAL OF CRYPTOLOGY, 1999, 12 (04) :261-289
[5]   Visual cryptography for grey level images [J].
Blundo, C ;
De Santis, A ;
Naor, M .
INFORMATION PROCESSING LETTERS, 2000, 75 (06) :255-259
[6]   Contrast optimal threshold visual cryptography schemes [J].
Blundo, C ;
D'Arco, P ;
De Santis, A ;
Stinson, DR .
SIAM JOURNAL ON DISCRETE MATHEMATICS, 2003, 16 (02) :224-261
[7]  
Chan C L, 2001, Colorectal Dis, V3, P141, DOI 10.1046/j.1463-1318.2001.00222.x
[8]  
DICRESCENZO G, 1996, LNCS, V1913, P332
[9]   Contrast-optimal k out of n secret sharing schemes in visual cryptography [J].
Hofmeister, T ;
Krause, M ;
Simon, HU .
THEORETICAL COMPUTER SCIENCE, 2000, 240 (02) :471-485
[10]  
Ishihara T, 2002, IEICE T FUND ELECTR, VE85A, P158