Skip to main content

Using Colors to Improve Visual Cryptography for Black and White Images

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6673))

Abstract

Black-and-white visual cryptography (bw-vc) allows the sharing of b&w secret images transforming a secret image into a number of b&w shares. Colored visual cryptography allows the sharing of color images by means of color shares. In this paper we propose a new model, called colored-black-and-white (cbw-vc), in which the secret image is b&w and the shares are color images.

The motivation for the use of this new model is that of constructing schemes to share b&w images using a smaller pixel expansion. Using the cbw-vc model, we provide (2,n)-threshold schemes with pixel expansion m = ⌈log3 n ⌉, improving on the best pixel expansion attainable in the bw-vc model.

For the case of schemes with perfect reconstruction of black pixels we provide a general construction that allows to transform any bw-vc scheme into a cbw-vc scheme whose pixel expansion is 1/3 of the pixel expansion of the starting bw-vc scheme.

When there are very few participants, namely n = 2,3, the proposed cbw-vc (2,n)-threshold schemes have no pixel expansion! We prove that the above two cases are the only ones where it is possible to provide schemes without pixel expansion. That is, we prove that, in the cbw-vc model, it is not possible to construct (2,n)-threshold schemes, for n ≥ 4, and (k,n)-threshold schemes, for k ≥ 3, without pixel expansion.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structures. Information and Computation 129(2), 86–106 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  2. Blundo, C., De Bonis, A., De Santis, A.: Improved Schemes for Visual Cryptography. Designs, Codes and Cryptography 24, 255–278 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  3. Blundo, C., De Santis, A.: Visual Cryptography Schemes with Perfect Reconstruction of Black Pixels. Comput. & Graphics 22(4), 449–455 (1998)

    Article  Google Scholar 

  4. Blundo, C., De Santis, A., Stinson, D.R.: On the Contrast in Visual Cryptography Schemes. Journal of Cryptology 12(4), 261–289 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  5. Bose, M., Mukerjee, R.: Optimal (2,n) visual cryptography schemes. Designs, Codes and Cryptography 40, 255–267 (2006)

    Article  MATH  Google Scholar 

  6. Cimato, S., De Prisco, R., De Santis, A.: Probabilistic Visual Cryptography Schemes. The Computer Journal 49(1), 97–107 (2006)

    Article  MATH  Google Scholar 

  7. Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. Theoretical Computer Science 374(1-3), 261–276 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  8. Cimato, S., Yang, C.-N. (eds.): Visual Cryptography and Secret Image Sharing. Digital Imaging and Computer Vision book series. CRC Press (to appear)

    Google Scholar 

  9. Eisen, P.A., Stinson, D.R.: Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels. Designs, Codes and Cryptography 25, 15–61 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  10. Hou, Y.-C.: Visual Cryptography for Color Images. Pattern Recognition 36, 1619–1629 (2003)

    Article  Google Scholar 

  11. Koga, H., Yamamoto, H.: Proposal of a Lattice-Based Visual Secret Sharing Scheme for Color and Gray-Scale Images. IEICE Trans. on Fundamentals of Electronics, Communication and Computer Sciences 81-A(6), 1262–1269 (1998)

    Google Scholar 

  12. Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  13. Verheul, E.R., van Tilborg, H.C.A.: Constructions and properties of k out of n visual secret. Designs, Codes, and Cryptography 11, 179–196 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  14. Yang, C.-N.: New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25(4), 481–494 (2004)

    Article  Google Scholar 

  15. Yang, C.-N., Laih, C.-A.: New Colored Visual Secret Sharing Schemes. Designs, Codes and Cryptography 20, 325–335 (2000)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

De Prisco, R., De Santis, A. (2011). Using Colors to Improve Visual Cryptography for Black and White Images. In: Fehr, S. (eds) Information Theoretic Security. ICITS 2011. Lecture Notes in Computer Science, vol 6673. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20728-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20728-0_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20727-3

  • Online ISBN: 978-3-642-20728-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics