Skip to main content

Plane Transform Visual Cryptography

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6526))

Abstract

Plane transformation visual cryptography takes a unique approach to some of the current shortcomings of current visual cryptography techniques. Typically, the direction and placement of the encrypted shares is critical when attempting to recover the secret. Many schemes are highly dependant on this stacking order. Within this paper, the scheme presented illustrates a technique whereby this restriction is loosened such that the number of acceptable alignment points is increased by performing a simple plane transform on one of the shares. This results in the same secret being recovered when the shares correctly aligned. The technique has also been extended to encompass multiple secrets, each of which can be recovered depending on the type of transformation performed on the shares.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, T.-H., Tsao, K.-H., Wei, K.-C.: Multiple-image encryption by rotating random grids. In: International Conference on Intelligent Systems Design and Applications, vol. 3, pp. 252–256 (2008)

    Google Scholar 

  2. Fang, W.-P.: Non-expansion visual secret sharing in reversible style. International Journal of Computer Science and Network Security 9(2), 204–208 (2009)

    Google Scholar 

  3. Hou, Y.-C.: Visual cryptography for color images. Pattern Recognition 36, 1619–1629 (2003)

    Article  Google Scholar 

  4. Hsu, H.-C., Chen, T.-S., Lin, Y.-H.: The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. Networking, Sensing and Control 2, 996–1001 (2004)

    Google Scholar 

  5. Katoh, T., Imai, H.: An extended construction method for visual secret sharing schemes. IEICE Transactions J79-A(8), 1344–1351 (1996)

    Google Scholar 

  6. Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Designs, Codes and Cryptography 50(2), 215–227 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  7. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  8. Shyu, S.J.: Efficient visual secret sharing scheme for color images. Pattern Recognition 39(5), 866–880 (2006)

    Article  MATH  Google Scholar 

  9. Shyu, S.J., Huang, S.-Y., Lee, Y.-K., Wang, R.-Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognition 40(12), 3633–3651 (2007)

    Article  MATH  Google Scholar 

  10. Weir, J., Yan, W.: Sharing multiple secrets using visual cryptography. In: IEEE International Symposium on Circuits and Systems, ISCAS 2009, pp. 509–512 (2009)

    Google Scholar 

  11. Weir, J., Yan, W.: Resolution variant visual cryptography for street view of google maps. In: IEEE International Symposium on Circuits and Systems, ISCAS 2010 (May 2010)

    Google Scholar 

  12. Weir, J., Yan, W.: A comprehensive study of visual cryptography. Transactions on Data Hiding and Multimedia Security 5 (2010)

    Google Scholar 

  13. Wu, C., Chen, L.: A study on visual cryptography. Master’s thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C. (1998)

    Google Scholar 

  14. Wu, H.-C., Chang, C.-C.: Sharing visual multi-secrets using circle shares. Computer Standards & Interfaces 28, 123–135 (2005)

    Article  Google Scholar 

  15. Yan, W., Duo, J., Kankanhalli, M.S.: Visual cryptography for print and scan applications. In: Proceedings of IEEE International Symposium on Circuits and Systems 2004, Vancouver, Canada, pp. 572 – 575 (May 2004)

    Google Scholar 

  16. Yang, C.-N., Chen, T.-S.: Extended visual secret sharing schemes: Improving the shadow image quality. IJPRAI 21(5), 879–898 (2007)

    Google Scholar 

  17. Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Transactions on Image Processing 15(8), 2441–2453 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Weir, J., Yan, W. (2011). Plane Transform Visual Cryptography. In: Kim, HJ., Shi, Y.Q., Barni, M. (eds) Digital Watermarking. IWDW 2010. Lecture Notes in Computer Science, vol 6526. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18405-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-18405-5_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-18404-8

  • Online ISBN: 978-3-642-18405-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics