Skip to main content

Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9023))

Included in the following conference series:

Abstract

In recent years, visual secret sharing (VSS) by random grids (RG) has gained much attention since it can avoid pixel expansion problem as well as has no codebook needed, which has acceptable visual quality based on the internal structure of the designed scheme. Till now, the previous schemes still suffer from low visual quality, from our point of view, and visual quality decreases fast when n increases. In this paper, a new RG-based VSS with improved visual quality based on Boolean operations is proposed, based on two different quality-improved approaches and gaining both advantages. The proposed scheme has several features such as (k, n) threshold, no codebook design, and no pixel expansion. Moreover, it has higher contrast compared with related schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  2. Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481–494 (2004)

    Google Scholar 

  3. Yan, X., Wang, S., Niu, X.: Threshold construction from specific cases in visual cryptography without the pixel expansion. Sig. Process. 105, 389–398 (2014)

    Google Scholar 

  4. Weir, J., Yan, W.: A comprehensive study of visual cryptography. In: Shi, Y.Q. (ed.) Transactions on DHMS V. LNCS, vol. 6010, pp. 70–105. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  5. Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12, 377–379 (1987)

    Google Scholar 

  6. Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 1197–1208 (2011)

    Google Scholar 

  7. Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Sig. Process. 93, 977–995 (2013)

    Google Scholar 

  8. Guo, T., Liu, F., Wu, C.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86, 2094–2109 (2013)

    Google Scholar 

  9. Shyu, S.J.: Image encryption by random grids. Pattern Recogn. 40, 1014–1031 (2007)

    MATH  Google Scholar 

  10. Hou, Y.C.: Visual cryptography for color images. Pattern Recogn. 36, 1619–1629 (2003)

    Google Scholar 

  11. Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4, 383–396 (2009)

    Google Scholar 

Download references

Acknowledgement

The authors would like to thank the anonymous reviewers for their valuable discussions and comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuehu Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Yan, X., Chen, G., Yang, CN., Cai, SR. (2015). Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19321-2_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19320-5

  • Online ISBN: 978-3-319-19321-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics