Abstract
Analysis of errors in two methods of color visual cryptography with random shares introduced by us in previous publications was performed. In both methods the shares are random, and consequently, errors occur in the decoded image. In one of the methods, where the coding is done by unhiding the pixels, there are two types of errors: missing color errors and hiding failure errors. In the other method, where the coding is done by unhiding, only the missing color errors occur. Probabilities of the missing color errors were modelled mathematically and frequencies of two types of errors were tested experimentally for both methods. Tests demonstrate that the model is correct. The results show in which cases the considered methods exhibit more accurate decoding results. Also, the extended results of randomness tests conducted with the NIST statistical test suite on the results of coding for a set of typical benchmark images are presented in the form of histograms of p-values. These graphical results indicate that the shares are indeed truly random.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250(1), 143–161 (2001)
Bassham, L.E., Rukhin, A.L., Soto, J., et al.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. rep., National Institute of Standards and Technology, Gaithersburg, MD, USA (16 Sep 2010), https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=906762, series: Special Publication (NIST SP), Rep. No. 800-22 Rev 1a
Orłowski, A., Chmielewski, L.J.: Generalized visual cryptography scheme with completely random shares. In: Petkov, N., Strisciuglio, N., Travieso, C. M. (eds.) Proceedings of the 2nd International Conference on Applications of Intelligent Systems APPIS 2019. pp. 33:1–33:6. Association for Computing Machinery, Las Palmas de Gran Canaria, Spain (7–9 Jan 2019). https://doi.org/10.1145/3309772.3309805
Chmielewski, L.J., Nieniewski, M., Orłowski, A.: Can color visual cryptography be truly random? In: Choraś, M., Choraś, R.S., Kurzyński, M., et al. (eds.) Progress in Image Processing, Pattern Recognition and Communication Systems – Proceedings of the International Conference on CORES, IP &C, ACS 2021. Lecture Notes in Networks and Systems, vol. 255, pp. 72–86. Springer, 2022, Bydgoszcz, Poland (28–30 Jun 2021)
Chmielewski, L.J., Nieniewski, M., Orłowski, A.: Testing the randomness of shares in color visual cryptography. Pattern Anal. Appl. 24(4), 1475–1487 (2021)
Chmielewski, L.J., Nieniewski, M., Orłowski, A.: Truly random color visual cryptography without surplus color spikes. In: Jędrzejowicz, P., Czarnowski, I. (eds.) Proceedings of the 3rd Polish Conference on Artificial Intelligence PP-RAI’2022. pp. 53–56. Publishing House of Gdynia Maritime University, Gdynia, Poland (25–27 Apr 2022), https://wydawnictwo.umg.edu.pl/pp-rai2022/
Chmielewski, L.J., Nieniewski, M., Orłowski, A.: Visual cryptography – file repository (2022), https://www.lchmiel.pl/visualcrypto [Updated Sep 2022]
Cimato, S., Yang, C.N.: Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision), 1st edn. CRC Press Inc, Boca Raton, FL, USA (2012)
Dhiman, K., Kasana, S.S.: Extended visual cryptography techniques for true color images. Comput. Electr. Eng. 70, 647–658 (2018)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) Advances in Cryptology — EUROCRYPT’94. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques. Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer, Perugia, Italy (9–12 May 1995)
Naor, M., Shamir, A.: Visual cryptography II: Improving the contrast via the cover base. In: Lomas, M. (ed.) Security Protocols. Proceedings of the International Workshop on Security Protocols. Lecture Notes in Computer Science, vol. 1189, pp. 197–202. Springer, Cambridge, United Kingdom (10–12 Apr 1997)
Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recogn. 40(12), 3633–3651 (2007)
Stinson, D.R., Paterson, M.: Cryptography: Theory and Practice, 4th edn. Chapman and Hall/CRC Press, Boca Raton (2018)
Tufte, E.R.: The Visual Display of Quantitative Information. Graphic Press, Cheshire, CT, USA (1983), https://www.edwardtufte.com/tufte/books_vdqi
Ulutas, M., Yazici, R., Nabiyev, V.V., Ulutas, G.: (2,2)-secret sharing scheme with improved share randomness. In: Proceedings of the 23rd International Symposium Computer and Information Sciences ISCIS 2008. pp. 1–5. IEEE, Istanbul, Turkey (27–29 Oct 2008)
Wang, D., Yi, F., Li, X.: On general construction for extended visual cryptography schemes. Pattern Recogn. 42(11), 3071–3082 (2009)
Wu, H.C., Chang, C.C.: Sharing visual multi-secrets using circle shares. Comput. Stand. Interfaces 28(1), 123–135 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix: Histograms of p-Values
Appendix: Histograms of p-Values
Here, the graphs which represent the histograms of p-values generated in the tests of the truly random method, basic version and no hiding error version, as well as those for the coordinated method ([5], for comparison with a method which is not fully random), are presented.
The notations concerning the histograms and the additional graphs were explained in Sects. 4.1 and 4.2.
The histograms of p-values for the truly random method, basic version, are shown in Figs. 7–12, and for the no hiding error version, the histograms are shown in Figs. 13–18. In the histograms for the image test100, Figs. 7 and 13, it can be seen that the preconditions for the test Universal were never met, due to that this simple testing image was too small.
Additionally, examples of histograms for images coded with the coordinated method [5], which indicate that the shares are not fully random in that method, are shown for reference in Figs. 19, 20.
Some of the histograms for the basic method as well as those for the coordinated method were shown previously in [4, 5]. For this paper they were improved by adding the subgraphs of \(r_L\) and \(r_N\) according to (5, 6), which broadens the image of randomness of the methods considered. Moreover, the histograms for images and methods which were already presented before were now generated from different random realizations of the images than those previously shown.
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Chmielewski, L.J., Nieniewski, M., Orłowski, A. (2023). Error Analysis and Graphical Evidence of Randomness in Two Methods of Color Visual Cryptography. In: Chmielewski, L.J., Orłowski, A. (eds) Computer Vision and Graphics. ICCVG 2022. Lecture Notes in Networks and Systems, vol 598. Springer, Cham. https://doi.org/10.1007/978-3-031-22025-8_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-22025-8_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-22024-1
Online ISBN: 978-3-031-22025-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)