Abstract
Tagged visual cryptography (TVC) is a brand new type of visual cryptography (VC) in which additional tags are concealed into each generated share. By folding up each single share, the associated tagged pattern is visually revealed. Such additional tag patterns greatly enrich extra abilities of VC, such as augmented message carried in a single share, user-friendly interface to manage the shares, and/or evidence for verifying consistency among those shares cooperating in a decryption instance. However, reported \((k,n)\) TVC proposed by Wang and Hsu still suffers from the defects such as pixel expansion, code book required in the encoding phase and low image quality. In this work, a \((k,n)\) TVC by adopting the concept of random grid (RG) is introduced. The proposed method can solve the pixel expansion and code book needed problems. Further, better visual quality of both the recovered secret image and reconstructed tag image is provided according to the theoretical analysis and demonstrated experiments.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)
Liu, F., Wu, C., Lin, X.: Step construction of visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 5(1), 27–38 (2010)
Ateniese, G., Blundo, C., Santis, A., Stinson, D.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1–2), 143–161 (2001)
Zhou, Z., Arce, G., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Proc. 15(8), 2441–2453 (2006)
Wang, Z., Arce, G., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383–396 (2009)
Hofmeister, T., Krause, M., Simon, H.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240(2), 471–485 (2000)
Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 82(10), 2172–2177 (1999)
Yang, C.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25(4), 486–494 (2004)
Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2006)
Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377–379 (1987)
Shyu, S.: Image encryption by random grids. Pattern Recogn. 40(3), 1014–1031 (2007)
Shyu, S.: Image encryption by multiple random grids. Pattern Recogn. 42(7), 1582–1596 (2009)
Chen, T., Tsao, K.: Visual secret sharing by random grids revisited. Pattern Recogn. 42(9), 2203–2217 (2009)
Chen, T., Tsao, K.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 1197–1208 (2011)
Wu, X., Sun, W.: Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J. Syst. Softw. 85(5), 1119–1134 (2011)
Wu, X., Sun, W.: Visual secret sharing for general access structures by random grids. IET Inf. Secur. 6(4), 299–309 (2012)
Lee, Y., Chen, T.: Insight into collusion attacks in random-grid-based visual secret sharing. Signal Proc. 92(3), 727–736 (2012)
Wu, X., Sun, W.: Random grid-based visual secret sharing with abilities of or and xor decryptions. J. Vis. Commun. Image Represent. 24(1), 48–62 (2013)
Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Signal Proc. 93(5), 977–995 (2013)
Wu, X., Liu, T., Sun, W.: Improving the visual quality of random grid-based visual secret sharing via error diffusion. J. Vis. Commun. Image Represent. 24(5), 552–566 (2013)
Wu, X., Sun, W.: Generalized random grid and its applications in visual cryptography. IEEE Trans. Inf. Forensics Secur. 8(9), 1541–1553 (2013)
Wang, R., Lee, Y.: Random grid-based visual cryptography with identifiable shares. J. Electron. Imaging 20(1), 013021–013021 (2011)
Wang, R., Hsu, S.: Tagged visual cryptography. IEEE Signal Proc. Lett. 18(11), 627–630 (2011)
Acknowledgment
This work was in part supported by 973 Program (Grant No. 2011CB302400) and Natural Science Foundation of Guangdong Province, China (Grant No. S2013010013728).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ou, D., Wu, X., Dai, L., Sun, W. (2014). Improved Tagged Visual Cryptograms by Using Random Grids. In: Shi, Y., Kim, HJ., Pérez-González, F. (eds) Digital-Forensics and Watermarking. IWDW 2013. Lecture Notes in Computer Science(), vol 8389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43886-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-662-43886-2_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43885-5
Online ISBN: 978-3-662-43886-2
eBook Packages: Computer ScienceComputer Science (R0)