Abstract
Tagged visual cryptography scheme (TaVCS) is a new type of visual cryptography scheme, in which an additional tag image is revealed visually by folding up each share. A TaVCS not only carries augmented information in each share, but also provides user-friendly interface to identify each share. In this paper, we present a novel method to construct (k, n)-TaVCS. It can adjust visual quality of both the reconstructed secret image and the recovered tag image flexibly. Meanwhile, the proposed method provides better visual quality of both the reconstructed secret image and the recovered tag image under certain condition. Experimental results and theoretical analysis demonstrate the effectiveness of the proposed method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Eisen, P.A., Stinson, D.R.: Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. Des. Codes Crypt. 25, 15–61 (2002)
Koga, H.: A general formula of the (\(t\),\(n\))-Threshold visual secret sharing scheme. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 328–345. Springer, Heidelberg (2002)
Blundo, C., Cimato, S., De Santis, A.: Visual cryptography schemes with optimal pixel expansion. Theoret. Comput. Sci. 369, 169–182 (2006)
Shyu, S.J., Chen, M.C.: Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 6, 960–969 (2011)
Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Fundam. Electron. Commun. Comput. Sci. 82(10), 2172–2177 (1999)
Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481–494 (2004)
Shyu, S.J.: Image encryption by random grids. Pattern Recogn. 40, 1014–1031 (2007)
Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 1197–1208 (2011)
Wu, X.T., Sun, W.: Generalized random grid and its applications in visual cryptography. IEEE Trans. Inf. Forensics Secur. 8(9), 1541–1553 (2013)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1–2), 143–161 (2001)
Wang, D., Yi, F., Li, X.: On general construction for extended visual cryptography schemes. Pattern Recogn. 42, 3071–3082 (2009)
Liu, F., Wu, C.K.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307–322 (2011)
Guo, T., Liu, F., Wu, C.K.: K out of k extended visual cryptography scheme by random grids. Signal Proc. 94, 90–101 (2014)
Yang, C.N., Yang, Y.Y.: New extended visual cryptography schemes with clearer shadow images. Inf. Sci. 271, 246–263 (2014)
Yan, X.H., Wang, S., Niu, X.M., Yang, C.N.: Generalized random grids-based threshold visual cryptography with meaningful shares. Signal Proc. 109, 317–333 (2015)
Wang, R.Z., Hsu, S.F.: Tagged visual cryptography. IEEE Signal Proc Lett. 18(11), 627–630 (2011)
Ou, D., Wu, X., Dai, L., Sun, W.: Improved tagged visual cryptograms by using random grids. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 79–94. Springer, Heidelberg (2014)
Verheul, E.R., Van Tilborg, H.C.A.: Constructions and properties of k out of n visual secret sharing scheme. Des. Codes Crypt. 1, 179–196 (1997)
Liu, F., Wu, C.K., Lin, X.J.: A new definition of the contrast of visual cryptography scheme. Inform. Process. Lett. 110, 241–246 (2010)
Acknowledgments
Many thanks to the anonymous reviewers for their valuable comments. This work was supported by the “Strategic Priority Research Program” of the Chinese Academy of Sciences grant No. Y2W0012102 and the IIE’s Project grant No. Y5X0061102.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Ren, Y., Liu, F., Lin, D., Feng, R., Wang, W. (2016). A New Construction of Tagged Visual Cryptography Scheme. In: Shi, YQ., Kim, H., Pérez-González, F., Echizen, I. (eds) Digital-Forensics and Watermarking. IWDW 2015. Lecture Notes in Computer Science(), vol 9569. Springer, Cham. https://doi.org/10.1007/978-3-319-31960-5_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-31960-5_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31959-9
Online ISBN: 978-3-319-31960-5
eBook Packages: Computer ScienceComputer Science (R0)