Improved Halftone Visual Cryptography by Random Grids

被引:0
作者
Liang, Zhuoqian [1 ]
Yang, Meihua [2 ]
机构
[1] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 516032, Guangdong, Peoples R China
[2] PLA Troops, Guangzhou 510320, Peoples R China
来源
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013) | 2014年 / 255卷
关键词
Visual cryptography; Visual secret sharing; Random grid; Halftone; GENERAL ACCESS STRUCTURES; QUALITY; IMAGES;
D O I
10.1007/978-81-322-1759-6_20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Halftone visual cryptography (HVC) is a technique to share secret image into a group of halftone shadows with pleasing visual quality. However, pixel expansion problem is serious in existing HVC schemes. In this paper, a random grid-based HVC scheme is proposed to solve this problem. The proposed method adopts complementary shares to prevent non-relevant information from showing on the decoded image. The size of halftone share generated by the proposed scheme is the same as the original secret image. Extensive experimental results are provided, demonstrating the effectiveness and advantages of the proposed schemes.
引用
收藏
页码:163 / 170
页数:8
相关论文
共 17 条
  • [1] Visual cryptography for general access structures
    Ateniese, G
    Blundo, C
    DeSantis, A
    Stinson, DR
    [J]. INFORMATION AND COMPUTATION, 1996, 129 (02) : 86 - 106
  • [2] Extended capabilities for visual cryptography
    Ateniese, G
    Blundo, C
    De Santis, A
    Stinson, DR
    [J]. THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) : 143 - 161
  • [3] On the contrast in visual cryptography schemes
    Blundo, C
    De Santis, A
    Stinson, DR
    [J]. JOURNAL OF CRYPTOLOGY, 1999, 12 (04) : 261 - 289
  • [4] Visual cryptography for grey level images
    Blundo, C
    De Santis, A
    Naor, M
    [J]. INFORMATION PROCESSING LETTERS, 2000, 75 (06) : 255 - 259
  • [5] Threshold visual secret sharing by random grids
    Chen, Tzung-Her
    Tsao, Kai-Hsiang
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (07) : 1197 - 1208
  • [6] Hofmeister T., 1997, Computing and Combinatorics. Third Annual International Conference COCOON '97 Proceedings, P176, DOI 10.1007/BFb0045084
  • [7] ENCRYPTION OF PICTURES AND SHAPES BY RANDOM GRIDS
    KAFRI, O
    KEREN, E
    [J]. OPTICS LETTERS, 1987, 12 (06) : 377 - 379
  • [8] Naor M., 1994, Workshop on the theory and application of of cryptographic techniques, P1, DOI [DOI 10.1007/BFB0053419, 10.1007/BFb0053419, DOI 10.1007/978-1-4939-9484-7_1]
  • [9] Efficient visual secret sharing scheme for color images
    Shyu, SH
    [J]. PATTERN RECOGNITION, 2006, 39 (05) : 866 - 880
  • [10] Ulichney R, 1993, P SPIE HUM VIS VIS P, V1913, P332