Skip to main content

WiP: Security Enhanced Size Invariant Visual Cryptography with Perfect Reconstruction of White Pixels

  • Conference paper
  • First Online:
Information Systems Security (ICISS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11952))

Included in the following conference series:

Abstract

Visual Cryptography is an image encryption technique which reconstructs the image using human visual system. Presently used size invariant visual cryptography schemes (VCS) does not preserves both security and contrast conditions. In this paper we proposed a new method for size invariant block wise encoding VCS based on perfect reconstruction of white pixels which provides perfect security and retains the contrast. Here we have discussed an outline of size invariant VCS based on random basis column pixel expansion, block wise encoding and random basis VCS with perfect reconstruction of white pixels (PRWP) which have been demonstrated based on various research studies. We have also discussed the demerits of the existing models and made an experimental analysis between previous models and the proposed model. From the analysis we proved that the proposed method enhances the security and maintain the contrast.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) Advances in Cryptology – EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053419

    Chapter  Google Scholar 

  2. Pandey, D., Kumar, A., Singh, Y.: Feature and future of visual cryptography based schemes. In: Singh, K., Awasthi, A.K. (eds.) QShine 2013. LNICST, vol. 115, pp. 816–830. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37949-9_71

    Chapter  Google Scholar 

  3. Monoth, T., Babu Anto, P.: Analysis and design of tamperproof and contrast-enhanced secret sharing based on visual cryptography schemes, Ph. D thesis, Kannur University, Kerala, India (2012). http://shodhganga.inflibnet.ac.in

  4. Chow, Y.-W., Susilo, W., Wong, Duncan S.: Enhancing the perceived visual quality of a size invariant visual cryptography scheme. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 10–21. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34129-8_2

    Chapter  Google Scholar 

  5. Monoth, T., Babu Anto, P.: Contrast-enhanced visual cryptography schemes based on perfect reconstruction of white pixels and additional basis matrix. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds.) Computational Intelligence, Cyber Security and Computational Models. AISC, vol. 412, pp. 361–368. Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-0251-9_34

    Chapter  Google Scholar 

  6. Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 82(10), 2172–2177 (1999)

    Google Scholar 

  7. Jisha, T.E., Monoth, T.: Research advances in black and white visual cryptography schemes. Int. J. Adv. Intell. Syst. Comput. Springer (Accepted). http://www.springer.com/series/11156

  8. Liu, F., Guo, T., Wu, C., Qian, L.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331–342 (2012). https://doi.org/10.1016/j.jvcir.2011.11.003

    Article  Google Scholar 

  9. Chen, Y.-F., Chan, Y.-K., Huang, C.-C., Tsai, M.-H., Chu, Y.-P.: A multiple-level visual secret-sharing scheme without image size expansion. Inf. Sci. 177(21), 4696–4710 (2007)

    Article  MathSciNet  Google Scholar 

  10. Lin, T.H., Shiao, N.S., Chen, H.H., Tsai, C.S.: A new non-expansion visual cryptography scheme with high quality of recovered image. In: IET International Conference on Frontier Computing Theory, Technologies and Applications. IEEE Xplore (2010). https://doi.org/10.1049/cp.2010.0571

  11. Huang, Y.-J., Chang, J.-D.: Non-expanded visual cryptography scheme with authentication. In: IEEE 2nd International Symposium on Next-Generation Electronics (ISNE). IEEE (2013). https://doi.org/10.1109/isne.2013.6512319

  12. Mohan, A., Binu, V.P.: Quality improvement in color extended visual cryptography using ABM and PRWP. In: International Conference on Data Mining and Advanced Computing (SAPIENCE). IEEE Xplore (2016) https://doi.org/10.1109/SAPIENCE.2016.7684159

  13. Yan, B., Xiang, Y., Hua, G.: Improving the visual quality of size-invariant visual cryptography for grayscale images. An analysis-by-synthesis (AbS) approach. IEEE Trans. Image Process. 28(2) (2019). https://doi.org/10.1109/tip.2018.2874378

    Article  MathSciNet  Google Scholar 

  14. Yan, B., et al.: Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimed. Tools Appl. 75(18), 11157–11180 (2016)

    Article  Google Scholar 

  15. Singh, P., Raman, B., Misra, M.: A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Sig. Process. 142, 301–319 (2018)

    Article  Google Scholar 

  16. Ou, D., Sun, W., Wu, X.: Non-expansible XOR-based visual cryptography scheme with meaningful shares. Sig. Process. 108, 604–621 (2015). https://doi.org/10.1016/j.sigpro.2014.10.011

    Article  Google Scholar 

  17. Sharma, R., Agrawal, N.K., Khare, A., Pal, A.K.: An improved size invariant n, n extended visual cryptography scheme. Int. J. Bus. Data Commun. Netw. 12(2), 80–88 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to T. E. Jisha or Thomas Monoth .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jisha, T.E., Monoth, T. (2019). WiP: Security Enhanced Size Invariant Visual Cryptography with Perfect Reconstruction of White Pixels. In: Garg, D., Kumar, N., Shyamasundar, R. (eds) Information Systems Security. ICISS 2019. Lecture Notes in Computer Science(), vol 11952. Springer, Cham. https://doi.org/10.1007/978-3-030-36945-3_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36945-3_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36944-6

  • Online ISBN: 978-3-030-36945-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics