Skip to main content

Error Analysis and Graphical Evidence of Randomness in Two Methods of Color Visual Cryptography

  • Conference paper
  • First Online:
  • 243 Accesses

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 598))

Abstract

Analysis of errors in two methods of color visual cryptography with random shares introduced by us in previous publications was performed. In both methods the shares are random, and consequently, errors occur in the decoded image. In one of the methods, where the coding is done by unhiding the pixels, there are two types of errors: missing color errors and hiding failure errors. In the other method, where the coding is done by unhiding, only the missing color errors occur. Probabilities of the missing color errors were modelled mathematically and frequencies of two types of errors were tested experimentally for both methods. Tests demonstrate that the model is correct. The results show in which cases the considered methods exhibit more accurate decoding results. Also, the extended results of randomness tests conducted with the NIST statistical test suite on the results of coding for a set of typical benchmark images are presented in the form of histograms of p-values. These graphical results indicate that the shares are indeed truly random.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250(1), 143–161 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  2. Bassham, L.E., Rukhin, A.L., Soto, J., et al.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. rep., National Institute of Standards and Technology, Gaithersburg, MD, USA (16 Sep 2010), https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=906762, series: Special Publication (NIST SP), Rep. No. 800-22 Rev 1a

  3. Orłowski, A., Chmielewski, L.J.: Generalized visual cryptography scheme with completely random shares. In: Petkov, N., Strisciuglio, N., Travieso, C. M. (eds.) Proceedings of the 2nd International Conference on Applications of Intelligent Systems APPIS 2019. pp. 33:1–33:6. Association for Computing Machinery, Las Palmas de Gran Canaria, Spain (7–9 Jan 2019). https://doi.org/10.1145/3309772.3309805

  4. Chmielewski, L.J., Nieniewski, M., Orłowski, A.: Can color visual cryptography be truly random? In: Choraś, M., Choraś, R.S., Kurzyński, M., et al. (eds.) Progress in Image Processing, Pattern Recognition and Communication Systems – Proceedings of the International Conference on CORES, IP &C, ACS 2021. Lecture Notes in Networks and Systems, vol. 255, pp. 72–86. Springer, 2022, Bydgoszcz, Poland (28–30 Jun 2021)

    Google Scholar 

  5. Chmielewski, L.J., Nieniewski, M., Orłowski, A.: Testing the randomness of shares in color visual cryptography. Pattern Anal. Appl. 24(4), 1475–1487 (2021)

    Article  Google Scholar 

  6. Chmielewski, L.J., Nieniewski, M., Orłowski, A.: Truly random color visual cryptography without surplus color spikes. In: Jędrzejowicz, P., Czarnowski, I. (eds.) Proceedings of the 3rd Polish Conference on Artificial Intelligence PP-RAI’2022. pp. 53–56. Publishing House of Gdynia Maritime University, Gdynia, Poland (25–27 Apr 2022), https://wydawnictwo.umg.edu.pl/pp-rai2022/

  7. Chmielewski, L.J., Nieniewski, M., Orłowski, A.: Visual cryptography – file repository (2022), https://www.lchmiel.pl/visualcrypto [Updated Sep 2022]

  8. Cimato, S., Yang, C.N.: Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision), 1st edn. CRC Press Inc, Boca Raton, FL, USA (2012)

    MATH  Google Scholar 

  9. Dhiman, K., Kasana, S.S.: Extended visual cryptography techniques for true color images. Comput. Electr. Eng. 70, 647–658 (2018)

    Article  Google Scholar 

  10. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) Advances in Cryptology — EUROCRYPT’94. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques. Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer, Perugia, Italy (9–12 May 1995)

    Google Scholar 

  11. Naor, M., Shamir, A.: Visual cryptography II: Improving the contrast via the cover base. In: Lomas, M. (ed.) Security Protocols. Proceedings of the International Workshop on Security Protocols. Lecture Notes in Computer Science, vol. 1189, pp. 197–202. Springer, Cambridge, United Kingdom (10–12 Apr 1997)

    Google Scholar 

  12. Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recogn. 40(12), 3633–3651 (2007)

    Article  MATH  Google Scholar 

  13. Stinson, D.R., Paterson, M.: Cryptography: Theory and Practice, 4th edn. Chapman and Hall/CRC Press, Boca Raton (2018)

    Book  MATH  Google Scholar 

  14. Tufte, E.R.: The Visual Display of Quantitative Information. Graphic Press, Cheshire, CT, USA (1983), https://www.edwardtufte.com/tufte/books_vdqi

  15. Ulutas, M., Yazici, R., Nabiyev, V.V., Ulutas, G.: (2,2)-secret sharing scheme with improved share randomness. In: Proceedings of the 23rd International Symposium Computer and Information Sciences ISCIS 2008. pp. 1–5. IEEE, Istanbul, Turkey (27–29 Oct 2008)

    Google Scholar 

  16. Wang, D., Yi, F., Li, X.: On general construction for extended visual cryptography schemes. Pattern Recogn. 42(11), 3071–3082 (2009)

    Article  MATH  Google Scholar 

  17. Wu, H.C., Chang, C.C.: Sharing visual multi-secrets using circle shares. Comput. Stand. Interfaces 28(1), 123–135 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leszek J. Chmielewski .

Editor information

Editors and Affiliations

Appendix: Histograms of p-Values

Appendix: Histograms of p-Values

Here, the graphs which represent the histograms of p-values generated in the tests of the truly random method, basic version and no hiding error version, as well as those for the coordinated method ([5], for comparison with a method which is not fully random), are presented.

The notations concerning the histograms and the additional graphs were explained in Sects. 4.1 and 4.2.

The histograms of p-values for the truly random method, basic version, are shown in Figs. 712, and for the no hiding error version, the histograms are shown in Figs. 1318. In the histograms for the image test100, Figs. 7 and 13, it can be seen that the preconditions for the test Universal were never met, due to that this simple testing image was too small.

Additionally, examples of histograms for images coded with the coordinated method [5], which indicate that the shares are not fully random in that method, are shown for reference in Figs. 1920.

Some of the histograms for the basic method as well as those for the coordinated method were shown previously in [4, 5]. For this paper they were improved by adding the subgraphs of \(r_L\) and \(r_N\) according to (56), which broadens the image of randomness of the methods considered. Moreover, the histograms for images and methods which were already presented before were now generated from different random realizations of the images than those previously shown.

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chmielewski, L.J., Nieniewski, M., Orłowski, A. (2023). Error Analysis and Graphical Evidence of Randomness in Two Methods of Color Visual Cryptography. In: Chmielewski, L.J., Orłowski, A. (eds) Computer Vision and Graphics. ICCVG 2022. Lecture Notes in Networks and Systems, vol 598. Springer, Cham. https://doi.org/10.1007/978-3-031-22025-8_17

Download citation

Publish with us

Policies and ethics