Abstract
Black-and-white visual cryptography (bw-vc) allows the sharing of b&w secret images transforming a secret image into a number of b&w shares. Colored visual cryptography allows the sharing of color images by means of color shares. In this paper we propose a new model, called colored-black-and-white (cbw-vc), in which the secret image is b&w and the shares are color images.
The motivation for the use of this new model is that of constructing schemes to share b&w images using a smaller pixel expansion. Using the cbw-vc model, we provide (2,n)-threshold schemes with pixel expansion m = ⌈log3 n ⌉, improving on the best pixel expansion attainable in the bw-vc model.
For the case of schemes with perfect reconstruction of black pixels we provide a general construction that allows to transform any bw-vc scheme into a cbw-vc scheme whose pixel expansion is 1/3 of the pixel expansion of the starting bw-vc scheme.
When there are very few participants, namely n = 2,3, the proposed cbw-vc (2,n)-threshold schemes have no pixel expansion! We prove that the above two cases are the only ones where it is possible to provide schemes without pixel expansion. That is, we prove that, in the cbw-vc model, it is not possible to construct (2,n)-threshold schemes, for n ≥ 4, and (k,n)-threshold schemes, for k ≥ 3, without pixel expansion.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structures. Information and Computation 129(2), 86–106 (1996)
Blundo, C., De Bonis, A., De Santis, A.: Improved Schemes for Visual Cryptography. Designs, Codes and Cryptography 24, 255–278 (2001)
Blundo, C., De Santis, A.: Visual Cryptography Schemes with Perfect Reconstruction of Black Pixels. Comput. & Graphics 22(4), 449–455 (1998)
Blundo, C., De Santis, A., Stinson, D.R.: On the Contrast in Visual Cryptography Schemes. Journal of Cryptology 12(4), 261–289 (1999)
Bose, M., Mukerjee, R.: Optimal (2,n) visual cryptography schemes. Designs, Codes and Cryptography 40, 255–267 (2006)
Cimato, S., De Prisco, R., De Santis, A.: Probabilistic Visual Cryptography Schemes. The Computer Journal 49(1), 97–107 (2006)
Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. Theoretical Computer Science 374(1-3), 261–276 (2007)
Cimato, S., Yang, C.-N. (eds.): Visual Cryptography and Secret Image Sharing. Digital Imaging and Computer Vision book series. CRC Press (to appear)
Eisen, P.A., Stinson, D.R.: Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels. Designs, Codes and Cryptography 25, 15–61 (2002)
Hou, Y.-C.: Visual Cryptography for Color Images. Pattern Recognition 36, 1619–1629 (2003)
Koga, H., Yamamoto, H.: Proposal of a Lattice-Based Visual Secret Sharing Scheme for Color and Gray-Scale Images. IEICE Trans. on Fundamentals of Electronics, Communication and Computer Sciences 81-A(6), 1262–1269 (1998)
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Verheul, E.R., van Tilborg, H.C.A.: Constructions and properties of k out of n visual secret. Designs, Codes, and Cryptography 11, 179–196 (1997)
Yang, C.-N.: New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25(4), 481–494 (2004)
Yang, C.-N., Laih, C.-A.: New Colored Visual Secret Sharing Schemes. Designs, Codes and Cryptography 20, 325–335 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
De Prisco, R., De Santis, A. (2011). Using Colors to Improve Visual Cryptography for Black and White Images. In: Fehr, S. (eds) Information Theoretic Security. ICITS 2011. Lecture Notes in Computer Science, vol 6673. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20728-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-20728-0_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20727-3
Online ISBN: 978-3-642-20728-0
eBook Packages: Computer ScienceComputer Science (R0)