Skip to main content

Halftone Visual Cryptography with Complementary Cover Images

  • Conference paper
  • First Online:
  • 1730 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10082))

Abstract

By the addition of halftone techniques, halftone visual cryptography scheme (HVCS) embeds a secret image into halftone shares taking meaningful visual information. In this paper, we propose a (kn)-HVCS using complementary cover images. Before the halftone processing of the cover images by error diffusion, secret information pixels (SIPs) are prefixed based on the underlying (kn)-VCS. In the halftone processing, several pairs of complementary cover images are adopted and two halftone methods on the cover images are designed for different (kn) threshold access structures. The proposed scheme removes the share’s cross interference from other shares and obtains better visual quality. Furthermore, the proposed scheme eliminates the burden that each participant may carry multiple shares.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. ACM Theor. Comput. Sci. 250, 143–161 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  2. Droste, S.: New results on visual cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401–415. Springer, Heidelberg (1996). doi:10.1007/3-540-68697-5_30

    Google Scholar 

  3. Liu, F., Wu, C.K.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6, 307–322 (2011)

    Article  Google Scholar 

  4. Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. In: WSCG 2002, pp. 303–412. CSRN, Plzen (2002)

    Google Scholar 

  5. Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). doi:10.1007/BFb0053419

    Google Scholar 

  6. Tsai, D.S., Chen, T., Horng, G.: On generating meaningful shares in visual secret sharing scheme. Imaging Sci. J. 56, 49–55 (2008)

    Article  Google Scholar 

  7. Ulichney, R.A.: The void-and-cluster method for dither array generation. In: Human Vision, Visual Processing, and Digital Display IV, San Jose, CA, vol. 1913, pp. 332–343. SPIE (1993)

    Google Scholar 

  8. Wang, D.S., Yi, F., Li, X.: On general construction for extended visual cryptography schemes. Pattern Recogn. 42, 3071–3082 (2009)

    Article  MATH  Google Scholar 

  9. Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4, 383–396 (2009)

    Article  Google Scholar 

  10. Yan, X.H., Shen, W., Niu, X.M., Yang, C.N.: Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Digital Sig. Process. 38, 53–65 (2015)

    Article  Google Scholar 

  11. Yang, C.N., Yang, Y.Y.: New extended visual cryptography schemes with clearer shadow images. Inf. Sci. 271, 246–263 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  12. Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15, 2441–2453 (2006)

    Article  Google Scholar 

Download references

Acknowledgments

We would like to thank the anonymous reviewers for their important and helpful comments. This work was supported by the National Natural Science Foundation of China with No. 61602513 and No. 61671448, the Strategic Priority Research Program of the Chinese Academy of Sciences with No. XDA06010701, and the National Key R&D Program of China with No. 2016YFB0800100.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gang Shen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Shen, G., Liu, F., Fu, Z., Yu, B., Wang, W. (2017). Halftone Visual Cryptography with Complementary Cover Images. In: Shi, Y., Kim, H., Perez-Gonzalez, F., Liu, F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science(), vol 10082. Springer, Cham. https://doi.org/10.1007/978-3-319-53465-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53465-7_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53464-0

  • Online ISBN: 978-3-319-53465-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics