Skip to main content

Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 4141))

Abstract

Visual secret sharing (VSS) scheme is an image sharing scheme that divides a secret pixel into several sub pixels (the number of sub pixels is called the pixel expansion) and the secret image is visually revealed without additional computations. However the contrast of recovered image is poor and thus the VSS framework is always a research issue and not a practical scheme. In this paper, we introduce a new framework which prioritizes the pixels with different pixel expansions to reconstruct a high-quality image for practical use. Also, integrating the optical character recognition with the proposed VSS scheme we show a new automated visual authentication scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  2. Kuwakado, H., Tanaka, H.: Size-Reduced Visual Secret Sharing Scheme. IEICE Trans. on Funda. of Elect., Comm. and Comp. Sci. E87-A(5), 1193–1197 (2004)

    Google Scholar 

  3. Yang, C.N., Chen, T.S.: New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size. IEICE Trans. on Funda. of Elect., Comm. and Comp. Sci. (accepted for publication)

    Google Scholar 

  4. Hou, Y.C., Tu, S.F.: A Visual Cryptographic Technique for Chromatic Images Using Multi-pixel Encoding Method. Journal of Research and Practice in Information Technology 37(2), 179–191 (2005)

    Google Scholar 

  5. Ito, R., Kuwakado, H., Tanaka, H.: Image Size Invariant Visual Cryptography. IEICE Trans. on Funda. of Elect., Comm. and Comp. Sci. E82-A(10), 2172–2177 (1999)

    Google Scholar 

  6. Yang, C.N.: New Visual Secret Sharing Schemes Using Probabilistic Method. Pattern Recognition Letters 25(4), 481–494 (2004)

    Article  Google Scholar 

  7. Cimato, S., De Prisco, R., De Santis, A.: Probabilistic Visual Cryptography Schemes. The Computer Journal 49(1), 97–107 (2006)

    Article  Google Scholar 

  8. Gonzalez, R.C., Woods, R.E.: Digital Image Processing, International Edition, 2nd edn. Prentice Hall, Englewood Cliffs (2002)

    Google Scholar 

  9. Yang, C.N., Chen, T.S.: New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-wise Operation. In: Kamel, M., Campilho, A.C. (eds.) ICIAR 2005. LNCS, vol. 3656, pp. 1167–1174. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Verheul, E.R., Van Tilborg, H.C.A.: Constructions and Properties of k out of n Visual Secret Sharing Schemes. Designs, Codes and Cryptography 11(2), 179–196 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  11. Eisen, P.A., Stinson, D.R.: Threshold Visual Cryptography Schemes with Specified Whiteness. Designs, Codes and Cryptography 25(1), 15–61 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  12. Yamamoto, H., Hayasaki, Y., Nishida, N.: Securing Information Display by Use of Visual Cryptography. Optics Letters 28(17), 1564–1566 (2003)

    Article  Google Scholar 

  13. Tuyls, P., Kevenaar, T., Schrije, G.J., Staring, A.A.M., van Dijk, M.: Visual Crypto Displays Enabling Secure Communications. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 271–284. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Lukac, R., Platanniotis, K.: Digital image indexing using secret sharing schemes: a unified framework for single-sensor consumer electronics. IEEE Trans. On Consumer Electronics 51, 908–916 (2005)

    Article  Google Scholar 

  15. Naor, M., Pinkas, B.: Visual Authentication and Identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, CN., Chen, TS. (2006). Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions. In: Campilho, A., Kamel, M.S. (eds) Image Analysis and Recognition. ICIAR 2006. Lecture Notes in Computer Science, vol 4141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11867586_44

Download citation

  • DOI: https://doi.org/10.1007/11867586_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44891-4

  • Online ISBN: 978-3-540-44893-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics