Skip to main content

Non-expanding Friendly Visual Cryptography

  • Conference paper
Genetic and Evolutionary Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 238))

  • 1792 Accesses

Abstract

This paper proposed a non-expanding visual sharing scheme. Based on probability method, a friendly visual secret sharing result is approached. Different from traditional friendly visual cryptography method with block expansion characteristic, the proposed method preserve the size of shares. The result is also demonstrates in the paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  2. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structure. Information and Computing 129, 86–106 (1996)

    Article  MATH  Google Scholar 

  3. Wu, H.C., Chang, C.C.: Sharing visual multi-secrets using circle shares. Computer Standards & Interfaces 28, 123–135 (2005)

    Article  Google Scholar 

  4. Fang, W.P., Lin, J.C.: Visual Cryptography with Extra Ability of Hiding Confi-dential Data. Journal of Electronic Imaging 15, 023020 (2006)

    Google Scholar 

  5. Fang, W.P.: Visual Cryptography in reversible style. In: IEEE Proceeding on the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), Kaohsiung, Taiwan, R.O.C., November 26-28 (2007)

    Google Scholar 

  6. Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optics Letters 12(6), 377–379 (1987)

    Article  Google Scholar 

  7. Shyu, S.J.: Image encryption by random grids. Pattern Recognition 40(3), 1014–1031 (2007)

    Article  MATH  Google Scholar 

  8. Chen, T.H., Tsao, K.H.: Visual secret sharing by random grids revisited. Pattern Recognition (2008), http://www.sciencedirect.com/science?_ob=MImg&_imagekey=B6V14-4V1TXMJ-1-1&_cdi=5664&_user=2414342&_orig=mlkt&_coverDate=11%2F30%2F2008&_sk=999999999&view=c&wchp=dGLzVtz-zSkzV&md5=0f9b092b81e841ed86e4a8c6eadd4a22&ie=/sdarticle.pdf

  9. Lukac, R., Plataniotis, K.N.: Bi-level based secret sharing for image encryption. Pattern Recognition 38, 767–772 (2005)

    Article  MATH  Google Scholar 

  10. Fang, W.P., Lin, J.C.: Multi-channel Secret Image Transmission with Fast Decoding: by using Bit-level Sharing and Economic-size Shares. International Journal of Computer and Network Security 6, 228–234 (2006)

    Google Scholar 

  11. Fang, W.P.: Non-expansion Visual Secret Sharing in Reversible Style. International Journal of Computer and Network Security 9(2), 204–208 (2009)

    Google Scholar 

  12. Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25, 481–494 (2004)

    Article  Google Scholar 

  13. Fang, W.-P.: A Survey for Visual Sharing Scheme with Geometry Property. Journal of Image Processing and Communication 2(1), 35–39 (2010)

    Google Scholar 

  14. Fang, W.P.: Maximizing the Secret Hiding Ratio in Visual Secret Sharing with Reversible Property. International Journal of Computer and Network Secure

    Google Scholar 

  15. Fang, W.P., Lin, J.C.: Multi-channel Secret Image Transmission with Fast Decoding: by using Bit-level Sharing and Economic-size Shares. International Journal of Computer and Network Security 6, 228–234 (2006)

    Google Scholar 

  16. http://en.wikipedia.org/wiki/Error_diffusion

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wen-Pinn Fang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Fang, WP., Wang, RZ., Chen, SK. (2014). Non-expanding Friendly Visual Cryptography. In: Pan, JS., Krömer, P., Snášel, V. (eds) Genetic and Evolutionary Computing. Advances in Intelligent Systems and Computing, vol 238. Springer, Cham. https://doi.org/10.1007/978-3-319-01796-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01796-9_16

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-01795-2

  • Online ISBN: 978-3-319-01796-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics