Abstract
Plane transformation visual cryptography takes a unique approach to some of the current shortcomings of current visual cryptography techniques. Typically, the direction and placement of the encrypted shares is critical when attempting to recover the secret. Many schemes are highly dependant on this stacking order. Within this paper, the scheme presented illustrates a technique whereby this restriction is loosened such that the number of acceptable alignment points is increased by performing a simple plane transform on one of the shares. This results in the same secret being recovered when the shares correctly aligned. The technique has also been extended to encompass multiple secrets, each of which can be recovered depending on the type of transformation performed on the shares.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Chen, T.-H., Tsao, K.-H., Wei, K.-C.: Multiple-image encryption by rotating random grids. In: International Conference on Intelligent Systems Design and Applications, vol. 3, pp. 252–256 (2008)
Fang, W.-P.: Non-expansion visual secret sharing in reversible style. International Journal of Computer Science and Network Security 9(2), 204–208 (2009)
Hou, Y.-C.: Visual cryptography for color images. Pattern Recognition 36, 1619–1629 (2003)
Hsu, H.-C., Chen, T.-S., Lin, Y.-H.: The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. Networking, Sensing and Control 2, 996–1001 (2004)
Katoh, T., Imai, H.: An extended construction method for visual secret sharing schemes. IEICE Transactions J79-A(8), 1344–1351 (1996)
Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Designs, Codes and Cryptography 50(2), 215–227 (2009)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Shyu, S.J.: Efficient visual secret sharing scheme for color images. Pattern Recognition 39(5), 866–880 (2006)
Shyu, S.J., Huang, S.-Y., Lee, Y.-K., Wang, R.-Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognition 40(12), 3633–3651 (2007)
Weir, J., Yan, W.: Sharing multiple secrets using visual cryptography. In: IEEE International Symposium on Circuits and Systems, ISCAS 2009, pp. 509–512 (2009)
Weir, J., Yan, W.: Resolution variant visual cryptography for street view of google maps. In: IEEE International Symposium on Circuits and Systems, ISCAS 2010 (May 2010)
Weir, J., Yan, W.: A comprehensive study of visual cryptography. Transactions on Data Hiding and Multimedia Security 5 (2010)
Wu, C., Chen, L.: A study on visual cryptography. Master’s thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C. (1998)
Wu, H.-C., Chang, C.-C.: Sharing visual multi-secrets using circle shares. Computer Standards & Interfaces 28, 123–135 (2005)
Yan, W., Duo, J., Kankanhalli, M.S.: Visual cryptography for print and scan applications. In: Proceedings of IEEE International Symposium on Circuits and Systems 2004, Vancouver, Canada, pp. 572 – 575 (May 2004)
Yang, C.-N., Chen, T.-S.: Extended visual secret sharing schemes: Improving the shadow image quality. IJPRAI 21(5), 879–898 (2007)
Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Transactions on Image Processing 15(8), 2441–2453 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Weir, J., Yan, W. (2011). Plane Transform Visual Cryptography. In: Kim, HJ., Shi, Y.Q., Barni, M. (eds) Digital Watermarking. IWDW 2010. Lecture Notes in Computer Science, vol 6526. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18405-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-18405-5_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-18404-8
Online ISBN: 978-3-642-18405-5
eBook Packages: Computer ScienceComputer Science (R0)