Abstract
Recently, some region incrementing VCSs (RIVCSs) were proposed, which can gradually reconstruct secrets in a single image. In RIVCS, the secret image is subdivided into multiple secrecy level regions, in such a way that more shadows can be used to reveal the more secrecy level regions. The incrementing region property provides an attractive feature, which enables progressive decoding. However, the secret level regions of all previous RIVCSs are disjointed, which any two secrecy level regions do not have the same overlapping areas. In this paper, we discuss a (k, n) region-in-region incrementing VCS (RiRIVCS). Our (k, n)-RiRIVCS has (n(k+1) secrecy level regions, which the next secrecy level region is in the preceding secrecy level region. Such region allocations in our RiRIVCS have more areas to hide the secret than the non-overlapping regions in the previous RIVCS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. on Fund. of Elect. Comm. and Comp. Sci. E82-A, 2172–2177 (1999)
Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25, 481–494 (2004)
Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. The Computer Journal 49, 97–107 (2006)
Wang, D., Yi, F., Li, X.: Probabilistic visual secret sharing schemes for grey-scale images and color images. Information Sciences 181, 2189–2208 (2011)
Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognition 40, 3633–3651 (2007)
Feng, J.B., Wu, H.C., Tsai, C.S., Chang, Y.F., Chu, Y.P.: Visual Secret sharing for multiple secrets. Pattern Recognition 41, 3572–3581 (2008)
Yang, C.N., Chung, T.H.: A general multi-secret visual cryptography scheme. Optics Communications 283, 4949–4962 (2010)
Tsai, D.S., Chen, T.H., Horng, G.: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognition 40, 2356–2366 (2007)
Yang, C.N., Peng, A.G., Chen, T.S.: MTVSS (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty. Signal Processing 89, 1602–1624 (2009)
Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Designs, Codes and Cryptography 50, 215–227 (2009)
Cimato, S., De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes withreversing. Information Processing Letters 93, 199–206 (2005)
Verheul, E.R., Van Tilborg, H.C.A.: Constructions and properties of k out of n visual secret sharing scheme. Designs, Codes and Cryptography 1, 179–196 (1997)
Yang, C.N., Chen, T.S.: Colored visual cryptography scheme based on additive color mixing. Pattern Recognition 41, 3114–3129 (2008)
Cimato, S., Yang, C.N.: Visual cryptography and secret image sharing. CRC Press, Taylor & Francis (2011)
Wang, R.Z.: Region incrementing visual cryptography. IEEE Signal Processing Letters 16, 659–662 (2009)
Shyu, S.J., Jiang, H.W.: Efficient Construction for Region Incrementing Visual Cryptography. IEEE Transactions on Circuits and Systems for Video Technology 22, 769–777 (2012)
Yang, C.N., Shih, H.W., Wu, C.C., Harn, L.: k out of n Region Incrementing Scheme in Visual Cryptography. IEEE Transactions on Circuits and Systems for Video Technology 22, 799–810 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, CN., Lin, YC., Wu, CC. (2013). Region-in-Region Incrementing Visual Cryptography Scheme. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_37
Download citation
DOI: https://doi.org/10.1007/978-3-642-40099-5_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40098-8
Online ISBN: 978-3-642-40099-5
eBook Packages: Computer ScienceComputer Science (R0)