Abstract
Visual secret sharing (VSS) scheme is an image sharing scheme that divides a secret pixel into several sub pixels (the number of sub pixels is called the pixel expansion) and the secret image is visually revealed without additional computations. However the contrast of recovered image is poor and thus the VSS framework is always a research issue and not a practical scheme. In this paper, we introduce a new framework which prioritizes the pixels with different pixel expansions to reconstruct a high-quality image for practical use. Also, integrating the optical character recognition with the proposed VSS scheme we show a new automated visual authentication scheme.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Kuwakado, H., Tanaka, H.: Size-Reduced Visual Secret Sharing Scheme. IEICE Trans. on Funda. of Elect., Comm. and Comp. Sci. E87-A(5), 1193–1197 (2004)
Yang, C.N., Chen, T.S.: New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size. IEICE Trans. on Funda. of Elect., Comm. and Comp. Sci. (accepted for publication)
Hou, Y.C., Tu, S.F.: A Visual Cryptographic Technique for Chromatic Images Using Multi-pixel Encoding Method. Journal of Research and Practice in Information Technology 37(2), 179–191 (2005)
Ito, R., Kuwakado, H., Tanaka, H.: Image Size Invariant Visual Cryptography. IEICE Trans. on Funda. of Elect., Comm. and Comp. Sci. E82-A(10), 2172–2177 (1999)
Yang, C.N.: New Visual Secret Sharing Schemes Using Probabilistic Method. Pattern Recognition Letters 25(4), 481–494 (2004)
Cimato, S., De Prisco, R., De Santis, A.: Probabilistic Visual Cryptography Schemes. The Computer Journal 49(1), 97–107 (2006)
Gonzalez, R.C., Woods, R.E.: Digital Image Processing, International Edition, 2nd edn. Prentice Hall, Englewood Cliffs (2002)
Yang, C.N., Chen, T.S.: New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-wise Operation. In: Kamel, M., Campilho, A.C. (eds.) ICIAR 2005. LNCS, vol. 3656, pp. 1167–1174. Springer, Heidelberg (2005)
Verheul, E.R., Van Tilborg, H.C.A.: Constructions and Properties of k out of n Visual Secret Sharing Schemes. Designs, Codes and Cryptography 11(2), 179–196 (1997)
Eisen, P.A., Stinson, D.R.: Threshold Visual Cryptography Schemes with Specified Whiteness. Designs, Codes and Cryptography 25(1), 15–61 (2002)
Yamamoto, H., Hayasaki, Y., Nishida, N.: Securing Information Display by Use of Visual Cryptography. Optics Letters 28(17), 1564–1566 (2003)
Tuyls, P., Kevenaar, T., Schrije, G.J., Staring, A.A.M., van Dijk, M.: Visual Crypto Displays Enabling Secure Communications. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 271–284. Springer, Heidelberg (2004)
Lukac, R., Platanniotis, K.: Digital image indexing using secret sharing schemes: a unified framework for single-sensor consumer electronics. IEEE Trans. On Consumer Electronics 51, 908–916 (2005)
Naor, M., Pinkas, B.: Visual Authentication and Identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, CN., Chen, TS. (2006). Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions. In: Campilho, A., Kamel, M.S. (eds) Image Analysis and Recognition. ICIAR 2006. Lecture Notes in Computer Science, vol 4141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11867586_44
Download citation
DOI: https://doi.org/10.1007/11867586_44
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44891-4
Online ISBN: 978-3-540-44893-8
eBook Packages: Computer ScienceComputer Science (R0)