Skip to main content

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 6010))

Abstract

Visual cryptography provides a very powerful technique by which one secret can be distributed into two or more pieces known as shares. When the shares are printed on transparencies and then superimposed exactly together, the original secret can be recovered without computer participation. In this paper, we take multiple secrets into consideration and generate a key share for all the secrets; correspondingly, we share each secret using this key share. The secrets are recovered when the key is superimposed on the combined share in different locations using the proposed scheme. Also discussed and illustrated within this paper is how to embed a share of visual cryptography into halftone and colour images. The remaining share is used as a key share in order to perform the decryption. It is also worth noting that no information regarding the secrets is leaked in any of our proposed schemes. We provide the corresponding results in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  2. Khan, D.: The Codebreakers: The Story of Secret Writing. Macmillan Publishing Co., New York (1967)

    Google Scholar 

  3. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York (1995)

    Google Scholar 

  4. Kang, H.R.: Digital Color Halftoning. In: Society of Photo-Optical Instrumentation Engineers (SPIE), Bellingham, WA, USA (1999)

    Google Scholar 

  5. Hou, Y.C.: Visual cryptography for color images. Pattern Recognition 36, 1619–1629 (2003)

    Article  Google Scholar 

  6. Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Transactions on Image Processing 15(8), 2441–2453 (2006)

    Article  Google Scholar 

  7. Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended Schemes for Visual Cryptography. Theoretical Computer Science 250, 1–16 (1996)

    Google Scholar 

  8. Myodo, E., Sakazawa, S., Takishima, Y.: Visual cryptography based on void-and-cluster halftoning technique. In: ICIP, pp. 97–100 (2006)

    Google Scholar 

  9. Myodo, E., Takagi, K., Miyaji, S., Takishima, Y.: Halftone visual cryptography embedding a natural grayscale image based on error diffusion technique. In: ICME, pp. 2114–2117 (2007)

    Google Scholar 

  10. Wang, Z., Arce, G.R.: Halftone visual cryptography through error diffusion. In: ICIP, pp. 109–112 (2006)

    Google Scholar 

  11. Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theoretical Computer Science 250(1-2), 143–161 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  12. Lau, D.L., Arce, G.R.: Modern Digital Halftoning. Marcel Dekker, New York (2000)

    Google Scholar 

  13. Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. In: WSCG, pp. 303–310 (2002)

    Google Scholar 

  14. Zhang, Y.: Space-filling curve ordered dither. Computers & Graphics 22(4), 559–563 (1998)

    Article  Google Scholar 

  15. Lin, C.C., Tsai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters 24(1-3), 349–358 (2003)

    Article  Google Scholar 

  16. Koga, H., Yamamoto, H.: Proposal of a Lattice-Based Visual Secret Sharing Scheme for Color and Grey-Scale Images. IEICE Transation Fundamentals E81-A(6), 1262–1269 (1998)

    Google Scholar 

  17. Hou, Y.C., Chang, C.Y., Tu, S.F.: Visual cryptography for color images based on halftone technology. Image, Acoustic, Speech and Signal Processing, Part 2 (2001)

    Google Scholar 

  18. Prakash, N.K., Govindaraju, S.: Visual secret sharing schemes for color images using halftoning. In: Proceedings of the International Conference on Computational Intelligence and Multimedia Applications, ICCIMA 2007, Washington, DC, USA, pp. 174–178. IEEE Computer Society, Los Alamitos (2007)

    Chapter  Google Scholar 

  19. Chang, C.C., Lin, C.C., Lin, C.H., Chen, Y.H.: A novel secret image sharing scheme in color images using small shadow images. Information Sciences 178(11), 2433–2447 (2008)

    Article  MathSciNet  Google Scholar 

  20. Yang, C.N., Chen, T.S.: New size-reduced visual secret sharing schemes with half reduction of shadow size. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005, Part I. LNCS, vol. 3480, pp. 19–28. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  21. Wu, C., Chen, L.: A study on visual cryptography. Master’s thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C. (1998)

    Google Scholar 

  22. Wu, H.C., Chang, C.C.: Sharing visual multi-secrets using circle shares. Computer Standards & Interfaces 28, 123–135 (2005)

    Article  Google Scholar 

  23. Hsu, H.C., Chen, T.S., Lin, Y.H.: The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. Networking, Sensing and Control 2, 996–1001 (2004)

    Google Scholar 

  24. Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognition 40(12), 3633–3651 (2007)

    Article  MATH  Google Scholar 

  25. Shyu, S.J.: Efficient visual secret sharing scheme for color images. Pattern Recognition 39(5), 866–880 (2006)

    Article  MATH  Google Scholar 

  26. Chuang, S.C., Huang, C.H., Wu, J.L.: Unseen visible watermarking. In: Proceedings of International Conference on Image Processing, San Antonio, USA, pp. 261–264 (2007)

    Google Scholar 

  27. Hersch, R.D., Chosson, S.: Band moiré images. In: ACM SIGGRAPH, pp. 239–247. ACM, New York (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Weir, J., Yan, W. (2010). Secure Masks for Visual Cryptography. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security V. Lecture Notes in Computer Science, vol 6010. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14298-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14298-7_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14297-0

  • Online ISBN: 978-3-642-14298-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics