Abstract
Visual Cryptography is an image encryption technique which reconstructs the image using human visual system. Presently used size invariant visual cryptography schemes (VCS) does not preserves both security and contrast conditions. In this paper we proposed a new method for size invariant block wise encoding VCS based on perfect reconstruction of white pixels which provides perfect security and retains the contrast. Here we have discussed an outline of size invariant VCS based on random basis column pixel expansion, block wise encoding and random basis VCS with perfect reconstruction of white pixels (PRWP) which have been demonstrated based on various research studies. We have also discussed the demerits of the existing models and made an experimental analysis between previous models and the proposed model. From the analysis we proved that the proposed method enhances the security and maintain the contrast.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) Advances in Cryptology – EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053419
Pandey, D., Kumar, A., Singh, Y.: Feature and future of visual cryptography based schemes. In: Singh, K., Awasthi, A.K. (eds.) QShine 2013. LNICST, vol. 115, pp. 816–830. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37949-9_71
Monoth, T., Babu Anto, P.: Analysis and design of tamperproof and contrast-enhanced secret sharing based on visual cryptography schemes, Ph. D thesis, Kannur University, Kerala, India (2012). http://shodhganga.inflibnet.ac.in
Chow, Y.-W., Susilo, W., Wong, Duncan S.: Enhancing the perceived visual quality of a size invariant visual cryptography scheme. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 10–21. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34129-8_2
Monoth, T., Babu Anto, P.: Contrast-enhanced visual cryptography schemes based on perfect reconstruction of white pixels and additional basis matrix. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds.) Computational Intelligence, Cyber Security and Computational Models. AISC, vol. 412, pp. 361–368. Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-0251-9_34
Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 82(10), 2172–2177 (1999)
Jisha, T.E., Monoth, T.: Research advances in black and white visual cryptography schemes. Int. J. Adv. Intell. Syst. Comput. Springer (Accepted). http://www.springer.com/series/11156
Liu, F., Guo, T., Wu, C., Qian, L.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331–342 (2012). https://doi.org/10.1016/j.jvcir.2011.11.003
Chen, Y.-F., Chan, Y.-K., Huang, C.-C., Tsai, M.-H., Chu, Y.-P.: A multiple-level visual secret-sharing scheme without image size expansion. Inf. Sci. 177(21), 4696–4710 (2007)
Lin, T.H., Shiao, N.S., Chen, H.H., Tsai, C.S.: A new non-expansion visual cryptography scheme with high quality of recovered image. In: IET International Conference on Frontier Computing Theory, Technologies and Applications. IEEE Xplore (2010). https://doi.org/10.1049/cp.2010.0571
Huang, Y.-J., Chang, J.-D.: Non-expanded visual cryptography scheme with authentication. In: IEEE 2nd International Symposium on Next-Generation Electronics (ISNE). IEEE (2013). https://doi.org/10.1109/isne.2013.6512319
Mohan, A., Binu, V.P.: Quality improvement in color extended visual cryptography using ABM and PRWP. In: International Conference on Data Mining and Advanced Computing (SAPIENCE). IEEE Xplore (2016) https://doi.org/10.1109/SAPIENCE.2016.7684159
Yan, B., Xiang, Y., Hua, G.: Improving the visual quality of size-invariant visual cryptography for grayscale images. An analysis-by-synthesis (AbS) approach. IEEE Trans. Image Process. 28(2) (2019). https://doi.org/10.1109/tip.2018.2874378
Yan, B., et al.: Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimed. Tools Appl. 75(18), 11157–11180 (2016)
Singh, P., Raman, B., Misra, M.: A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Sig. Process. 142, 301–319 (2018)
Ou, D., Sun, W., Wu, X.: Non-expansible XOR-based visual cryptography scheme with meaningful shares. Sig. Process. 108, 604–621 (2015). https://doi.org/10.1016/j.sigpro.2014.10.011
Sharma, R., Agrawal, N.K., Khare, A., Pal, A.K.: An improved size invariant n, n extended visual cryptography scheme. Int. J. Bus. Data Commun. Netw. 12(2), 80–88 (2016)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Jisha, T.E., Monoth, T. (2019). WiP: Security Enhanced Size Invariant Visual Cryptography with Perfect Reconstruction of White Pixels. In: Garg, D., Kumar, N., Shyamasundar, R. (eds) Information Systems Security. ICISS 2019. Lecture Notes in Computer Science(), vol 11952. Springer, Cham. https://doi.org/10.1007/978-3-030-36945-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-36945-3_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36944-6
Online ISBN: 978-3-030-36945-3
eBook Packages: Computer ScienceComputer Science (R0)