Skip to main content

Improved Tagged Visual Cryptograms by Using Random Grids

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8389))

Abstract

Tagged visual cryptography (TVC) is a brand new type of visual cryptography (VC) in which additional tags are concealed into each generated share. By folding up each single share, the associated tagged pattern is visually revealed. Such additional tag patterns greatly enrich extra abilities of VC, such as augmented message carried in a single share, user-friendly interface to manage the shares, and/or evidence for verifying consistency among those shares cooperating in a decryption instance. However, reported \((k,n)\) TVC proposed by Wang and Hsu still suffers from the defects such as pixel expansion, code book required in the encoding phase and low image quality. In this work, a \((k,n)\) TVC by adopting the concept of random grid (RG) is introduced. The proposed method can solve the pixel expansion and code book needed problems. Further, better visual quality of both the recovered secret image and reconstructed tag image is provided according to the theoretical analysis and demonstrated experiments.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  2. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)

    Article  MATH  Google Scholar 

  3. Liu, F., Wu, C., Lin, X.: Step construction of visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 5(1), 27–38 (2010)

    Article  Google Scholar 

  4. Ateniese, G., Blundo, C., Santis, A., Stinson, D.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1–2), 143–161 (2001)

    Article  MATH  Google Scholar 

  5. Zhou, Z., Arce, G., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Proc. 15(8), 2441–2453 (2006)

    Article  Google Scholar 

  6. Wang, Z., Arce, G., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383–396 (2009)

    Article  Google Scholar 

  7. Hofmeister, T., Krause, M., Simon, H.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240(2), 471–485 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  8. Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 82(10), 2172–2177 (1999)

    Google Scholar 

  9. Yang, C.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25(4), 486–494 (2004)

    Google Scholar 

  10. Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2006)

    Article  Google Scholar 

  11. Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377–379 (1987)

    Article  Google Scholar 

  12. Shyu, S.: Image encryption by random grids. Pattern Recogn. 40(3), 1014–1031 (2007)

    Article  MATH  Google Scholar 

  13. Shyu, S.: Image encryption by multiple random grids. Pattern Recogn. 42(7), 1582–1596 (2009)

    Article  MATH  Google Scholar 

  14. Chen, T., Tsao, K.: Visual secret sharing by random grids revisited. Pattern Recogn. 42(9), 2203–2217 (2009)

    Article  MATH  Google Scholar 

  15. Chen, T., Tsao, K.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 1197–1208 (2011)

    Article  Google Scholar 

  16. Wu, X., Sun, W.: Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J. Syst. Softw. 85(5), 1119–1134 (2011)

    Article  Google Scholar 

  17. Wu, X., Sun, W.: Visual secret sharing for general access structures by random grids. IET Inf. Secur. 6(4), 299–309 (2012)

    Article  MathSciNet  Google Scholar 

  18. Lee, Y., Chen, T.: Insight into collusion attacks in random-grid-based visual secret sharing. Signal Proc. 92(3), 727–736 (2012)

    Article  Google Scholar 

  19. Wu, X., Sun, W.: Random grid-based visual secret sharing with abilities of or and xor decryptions. J. Vis. Commun. Image Represent. 24(1), 48–62 (2013)

    Article  Google Scholar 

  20. Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Signal Proc. 93(5), 977–995 (2013)

    Article  Google Scholar 

  21. Wu, X., Liu, T., Sun, W.: Improving the visual quality of random grid-based visual secret sharing via error diffusion. J. Vis. Commun. Image Represent. 24(5), 552–566 (2013)

    Article  Google Scholar 

  22. Wu, X., Sun, W.: Generalized random grid and its applications in visual cryptography. IEEE Trans. Inf. Forensics Secur. 8(9), 1541–1553 (2013)

    Article  MathSciNet  Google Scholar 

  23. Wang, R., Lee, Y.: Random grid-based visual cryptography with identifiable shares. J. Electron. Imaging 20(1), 013021–013021 (2011)

    Article  Google Scholar 

  24. Wang, R., Hsu, S.: Tagged visual cryptography. IEEE Signal Proc. Lett. 18(11), 627–630 (2011)

    Article  Google Scholar 

Download references

Acknowledgment

This work was in part supported by 973 Program (Grant No. 2011CB302400) and Natural Science Foundation of Guangdong Province, China (Grant No. S2013010013728).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ou, D., Wu, X., Dai, L., Sun, W. (2014). Improved Tagged Visual Cryptograms by Using Random Grids. In: Shi, Y., Kim, HJ., Pérez-González, F. (eds) Digital-Forensics and Watermarking. IWDW 2013. Lecture Notes in Computer Science(), vol 8389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43886-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43886-2_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43885-5

  • Online ISBN: 978-3-662-43886-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics