Abstract
We propose two novel visual two-secret sharing schemes in this paper. The major difference between the previous and our approaches is that the two secrets are revealed by superimposing shares at different distances. In our schemes, two secret images would be encoded into two shares with different sizes, and the two secrets can be revealed by superimposing the two shares at two different superimposition positions. The distant superimposition for decoding enhances the flexibility of the visual cryptographic system.
This research was supported in part by the Ministry of Science and Technology, Taiwan, under Grants MOST 102-2221-E-130-005 and 103-2221-E-130-002-MY3.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Cimato, S., Yang, C.N.: Visual Cryptography and Secret Image Sharing. Taylor & Francis/CRC Press, Boca Raton (2011)
Shyu, S.J., Chen, K.: Visual multiple secret sharing based upon turning and flipping. Inf. Sci. 181(15), 3246–3266 (2011)
Shyu, S.J., Huang, S.-Y., Lee, Y.-L., Wang, R.-Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recogn. 40(12), 3633–3651 (2007)
Yamamoto, H., Hayasaki, Y., Nishida, N.: Securing information display by use of visual cryptography. Opt. Lett. 28, 1564–1566 (2003)
Yamamoto, H., Hayasaki, Y., Nishida, N.: Secure information display with limited viewing zone by use of multi-color visual cryptography. Opt. Express 12, 1258–1270 (2004)
Yamamoto, H., Hayasaki, Y., Nishida, N.: Securing display of grayscale and multicolored images by use of visual cryptography. In: Proceedings of the SPIE, vol. 5306, pp. 716−724 (2004)
Yamamoto, H., Hayasaki, Y.: Secure display that limits the viewing space by use of optically decodable encryption. In: Proceedings of the SPIE, vol. 6482, p. 64820C (2007)
Yamamoto, H., Hayasaki, Y., Nishida, N.: Secure information display with two limited viewing zones using two decoding masks based on visual secret sharing scheme. Jpn. J. Appl. Phys. Part 1 44, 1803–1807 (2005)
Yamamoto, H., Hayasaki, Y., Nishida, N.: Secure information display by use of multiple decoding masks. In: Proceedings of the SPIE, vol. 5600, pp. 192−199 (2011)
Shyu, S.J., Chen, M.-C., Chao, K.-M.: Securing information display for multiple secrets. Opt. Eng. 48(5), 057005-1-057005-12 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Li, Y.H., Shyu, S.J. (2015). Visual Two-Secret Sharing Schemes by Different Superimposition Positions. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-19321-2_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19320-5
Online ISBN: 978-3-319-19321-2
eBook Packages: Computer ScienceComputer Science (R0)