Skip to main content

Optimal Contrast and Size-Invariant Recursive VCS Using Perfect Reconstruction of White Pixels

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1176))

Abstract

Visual cryptography is an image secret sharing technique which encrypts the image into n shares and reconstructs the image using k shares from n shares by human visual system. Recursive visual cryptography scheme (RVCS) again encrypts the encrypted shares into sub-shares using recursion. In this paper, we proposed a new model for size-invariant RVCS based on Perfect Reconstruction of White Pixels (PRWP) which enhances the contrast. The size-invariant RVCS based on random basis column pixel expansion with PRWP has been demonstrated based on experimental investigations. We have also reviewed the shortcomings of the existing models and made an experimental analysis between the previous models and the proposed model. From the analysis, we proved that the proposed method enhances the contrast and maintains both security and reliability.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Naor, M., Shamir, A.: Visual Cryptography. Advances in Cryptology-Eurocrypt’94, LNCS 950, pp. 1–12 (1995)

    Google Scholar 

  2. Pandey, D., Kumar, A., Singh, Y.: Feature and Future of Visual Cryptography Based Schemes, Quality, Reliability, Security and Robustness in Heterogeneous Networks, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 115, pp. 816–830. Springer (2013). https://doi.org/10.1007/978-3-642-37949-9_71

  3. Monoth, T., Babu Anto, P.: Analysis and Design of Tamperproof and Contrast-Enhanced Secret Sharing Based on Visual Cryptography Schemes, Ph.D. thesis, Kannur University, Kerala, India (2012). http://shodhganga.inflibnet.ac.in

  4. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer, F., Monien, B. (eds.) Automata, Languages and Programming. ICALP 1996. Lecture Notes in Computer Science, Vol. 1099. Springer, Berlin (1996)

    Google Scholar 

  5. Weir, J., Yan, W.A.: Comprehensive study of visual cryptography. In: Shi, Y.Q. (eds.) Transactions on Data Hiding and Multimedia Security V. Lecture Notes in Computer Science, vol. 6010. Springer, Berlin (2010)

    Google Scholar 

  6. Jisha, T.E., Monoth, T.: Research advances in black and white visual cryptography schemes. Int. J. Adv. Intell. Syst. Comput. (2019). http://www.springer.com/series/11156. (Accepted)

  7. Lin, T.H., Shiao, N.S., Chen, H.H., Tsai, C.S.: A new non-expansion visual cryptography scheme with high quality of recovered image. In: IET International Conference on Frontier Computing. Theory, Technologies and Applications. IEEE Xplore (2010) https://doi.org/10.1049/cp.2010.0571

  8. Huang, Y.-J., Chang, J.-D.: Non-expanded visual cryptography scheme with authentication. In: IEEE 2nd International Symposium on Next-Generation Electronics (ISNE). IEEE (2013). https://doi.org/10.1109/isne.2013.6512319

  9. Chow, Y.W., Susilo, W., Wong, D.S.: Enhancing the perceived visual quality of a size invariant visual cryptography scheme. In: Information and Communications Security. Lecture Notes in Computer Science, vol. 7618. Springer, Berlin (2012)

    Google Scholar 

  10. Ito, R., Kuwakado, H., Thanka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. E82-A(10) (1999)

    Google Scholar 

  11. Liu, F., Guo, T., Wu, C.K., Qian, L.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331–342 (2012). https://doi.org/10.1016/j.jvcir.2011.11.003. (Elsevier)

  12. Chen, Y.-F., Chan, Y.-K., Huang, C.-C., Tsai, M.-H., Chu, Y.-P.: A multiple-level visual secret-sharing scheme without image size expansion. Inf. Sci. 177(21), 4696–4710 (2007)

    Article  MathSciNet  Google Scholar 

  13. Yan, B., Wang, Y.F., Song, L.Y., et al.: Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimedia Tools Appl. 75, 11157 (2016). https://doi.org/10.1007/s11042-015-2838-4

    Article  Google Scholar 

  14. Yan, B., Xiang, Y., Hua, G.: Improving the visual quality of size-invariant visual cryptography for grayscale images. An analysis-by-synthesis (AbS) approach. IEEE Trans. Image Process. 28(2) (2019). https://doi.org/10.1109/tip.2018.2874378

  15. Yan, B., Wang, Y.-F., Song, L.-Y., Yang, H.-M.: Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimedia Tools Appl. 75(18), 11157–11180 (2016) https://doi.org/10.1007/s11042-015-2838-4

  16. Ou, D., Sun, W., Xiaotian, W.: Non-expansible XOR-based visual cryptography scheme with meaningful shares. Sig. Process. 108, 604–621 (2015). https://doi.org/10.1016/j.sigpro.2014.10.011. (Elsevier)

    Article  Google Scholar 

  17. Sharma, R., Agrawal, N.K., Khare, A., Pal, A.K.: An improved size invariant (n, n) extended visual cryptography scheme. Int. J. Bus. Data Commun. Netw. 12(2) (2016)

    Google Scholar 

  18. Monoth, T., Babu, A.P.: Recursive visual cryptography using random basis column pixel expansion. In: 10th International Conference on Information Technology (ICIT 2007), Orissa, IEEE Xplore (2007), pp. 41–43. https://doi.org/10.1109/icit.2007.32

  19. Monoth, T., Babu Anto, P.: Contrast-enhanced visual cryptography schemes based on perfect reconstruction of white pixels and additional basis matrix. In: Computational Intelligence, Cyber Security and Computational Models, Advances in Intelligent Systems and Computing, vol. 412, pp. 361–368. Springer, Singapore (2016)

    Google Scholar 

  20. Monoth, T.: Contrast-enhanced recursive visual cryptography scheme based on additional basis matrices. In: Satapathy, S., Bhateja, V., Das, S. (eds.) Smart Intelligent Computing and Applications. Smart Innovation, Systems and Technologies, vol. 105. Springer, Singapore (2019)

    Google Scholar 

  21. Mohan, A., Binu, V.P.: Quality improvement in Color Extended Visual Cryptography using ABM and PRWP. In: International Conference on Data Mining and Advanced Computing (SAPIENCE). IEEE Xplore (2016). https://doi.org/10.1109/sapience.2016.7684159

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. E. Jisha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jisha, T.E., Monoth, T. (2021). Optimal Contrast and Size-Invariant Recursive VCS Using Perfect Reconstruction of White Pixels. In: Bhateja, V., Peng, SL., Satapathy, S.C., Zhang, YD. (eds) Evolution in Computational Intelligence. Advances in Intelligent Systems and Computing, vol 1176. Springer, Singapore. https://doi.org/10.1007/978-981-15-5788-0_17

Download citation

Publish with us

Policies and ethics