Region splitting visual cryptography using random grids

被引:2
作者
Meghrajani, Yogesh K. [1 ]
Mazumdar, Himanshu S. [1 ,2 ]
机构
[1] Dharmsinh Desai Univ, Fac Technol, Dept Elect & Commun, Nadiad 387001, Gujarat, India
[2] Dharmsinh Desai Univ, Fac Technol, Ctr Res & Dev, Nadiad 387001, Gujarat, India
关键词
Image Secret Sharing; Region based Reconstruction; Unexpanded Shares; Visual Cryptography;
D O I
10.1080/09720529.2015.1130479
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Visual cryptography is encryption technique to hide secret image into noise-like images, called as shares. Shares are stacked together to decrypt secret image. This paper presents multiple secrets sharing scheme called region splitting visual cryptography (RSVC) using random grids. To share n secrets, n shares are utilized along with common universal share. Proposed method has following features:(1) universal share for all secret messages, (2) any number of shares cannot reveal any information of universal share and secret messages, (3) no pixel expansion of shares, (4) no codebook requirement, and (5) human visual system is employed to decrypt the secret messages where no computational device or cryptographic knowledge is required.
引用
收藏
页码:1013 / 1023
页数:11
相关论文
共 15 条
[1]   A new visual cryptography scheme for STS based access structures [J].
Chakrabarti, Sucheta ;
Khanna, R. K. .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2006, 9 (01) :9-23
[2]   A new online extended visual cryptography scheme for STS access structures [J].
Chakrabarti, Sucheta ;
Pal, S. K. .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2008, 11 (03) :357-374
[3]   Universal share for the sharing of multiple images [J].
Fang, Wen-Pinn ;
Lin, Ja-Chen .
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2007, 30 (04) :753-757
[4]   Cheating in visual cryptography [J].
Horng, G ;
Chen, T ;
Tsai, D .
DESIGNS CODES AND CRYPTOGRAPHY, 2006, 38 (02) :219-236
[5]   ENCRYPTION OF PICTURES AND SHAPES BY RANDOM GRIDS [J].
KAFRI, O ;
KEREN, E .
OPTICS LETTERS, 1987, 12 (06) :377-379
[6]  
NOAR M, 1995, LECT NOTES COMPUTER, V950, P1
[7]   Applications of visual cryptography [J].
Rao, Subba Y. V. ;
Roy, Bimal K. .
INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2011, 26 (05) :429-442
[8]   Image encryption by random grids [J].
Shyu, Shyong Han .
PATTERN RECOGNITION, 2007, 40 (03) :1014-1031
[9]   Efficient Construction for Region Incrementing Visual Cryptography [J].
Shyu, Shyong Jian ;
Jiang, Hung-Wei .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2012, 22 (05) :769-777
[10]   Combinational domain encryption for still visual data [J].
Taneja, Nidhi ;
Raman, Balasubramanian ;
Gupta, Indra .
MULTIMEDIA TOOLS AND APPLICATIONS, 2012, 59 (03) :775-793