Abstract
Visual cryptography is an image secret sharing technique which encrypts the image into n shares and reconstructs the image using k shares from n shares by human visual system. Recursive visual cryptography scheme (RVCS) again encrypts the encrypted shares into sub-shares using recursion. In this paper, we proposed a new model for size-invariant RVCS based on Perfect Reconstruction of White Pixels (PRWP) which enhances the contrast. The size-invariant RVCS based on random basis column pixel expansion with PRWP has been demonstrated based on experimental investigations. We have also reviewed the shortcomings of the existing models and made an experimental analysis between the previous models and the proposed model. From the analysis, we proved that the proposed method enhances the contrast and maintains both security and reliability.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Naor, M., Shamir, A.: Visual Cryptography. Advances in Cryptology-Eurocrypt’94, LNCS 950, pp. 1–12 (1995)
Pandey, D., Kumar, A., Singh, Y.: Feature and Future of Visual Cryptography Based Schemes, Quality, Reliability, Security and Robustness in Heterogeneous Networks, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 115, pp. 816–830. Springer (2013). https://doi.org/10.1007/978-3-642-37949-9_71
Monoth, T., Babu Anto, P.: Analysis and Design of Tamperproof and Contrast-Enhanced Secret Sharing Based on Visual Cryptography Schemes, Ph.D. thesis, Kannur University, Kerala, India (2012). http://shodhganga.inflibnet.ac.in
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer, F., Monien, B. (eds.) Automata, Languages and Programming. ICALP 1996. Lecture Notes in Computer Science, Vol. 1099. Springer, Berlin (1996)
Weir, J., Yan, W.A.: Comprehensive study of visual cryptography. In: Shi, Y.Q. (eds.) Transactions on Data Hiding and Multimedia Security V. Lecture Notes in Computer Science, vol. 6010. Springer, Berlin (2010)
Jisha, T.E., Monoth, T.: Research advances in black and white visual cryptography schemes. Int. J. Adv. Intell. Syst. Comput. (2019). http://www.springer.com/series/11156. (Accepted)
Lin, T.H., Shiao, N.S., Chen, H.H., Tsai, C.S.: A new non-expansion visual cryptography scheme with high quality of recovered image. In: IET International Conference on Frontier Computing. Theory, Technologies and Applications. IEEE Xplore (2010) https://doi.org/10.1049/cp.2010.0571
Huang, Y.-J., Chang, J.-D.: Non-expanded visual cryptography scheme with authentication. In: IEEE 2nd International Symposium on Next-Generation Electronics (ISNE). IEEE (2013). https://doi.org/10.1109/isne.2013.6512319
Chow, Y.W., Susilo, W., Wong, D.S.: Enhancing the perceived visual quality of a size invariant visual cryptography scheme. In: Information and Communications Security. Lecture Notes in Computer Science, vol. 7618. Springer, Berlin (2012)
Ito, R., Kuwakado, H., Thanka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. E82-A(10) (1999)
Liu, F., Guo, T., Wu, C.K., Qian, L.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331–342 (2012). https://doi.org/10.1016/j.jvcir.2011.11.003. (Elsevier)
Chen, Y.-F., Chan, Y.-K., Huang, C.-C., Tsai, M.-H., Chu, Y.-P.: A multiple-level visual secret-sharing scheme without image size expansion. Inf. Sci. 177(21), 4696–4710 (2007)
Yan, B., Wang, Y.F., Song, L.Y., et al.: Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimedia Tools Appl. 75, 11157 (2016). https://doi.org/10.1007/s11042-015-2838-4
Yan, B., Xiang, Y., Hua, G.: Improving the visual quality of size-invariant visual cryptography for grayscale images. An analysis-by-synthesis (AbS) approach. IEEE Trans. Image Process. 28(2) (2019). https://doi.org/10.1109/tip.2018.2874378
Yan, B., Wang, Y.-F., Song, L.-Y., Yang, H.-M.: Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimedia Tools Appl. 75(18), 11157–11180 (2016) https://doi.org/10.1007/s11042-015-2838-4
Ou, D., Sun, W., Xiaotian, W.: Non-expansible XOR-based visual cryptography scheme with meaningful shares. Sig. Process. 108, 604–621 (2015). https://doi.org/10.1016/j.sigpro.2014.10.011. (Elsevier)
Sharma, R., Agrawal, N.K., Khare, A., Pal, A.K.: An improved size invariant (n, n) extended visual cryptography scheme. Int. J. Bus. Data Commun. Netw. 12(2) (2016)
Monoth, T., Babu, A.P.: Recursive visual cryptography using random basis column pixel expansion. In: 10th International Conference on Information Technology (ICIT 2007), Orissa, IEEE Xplore (2007), pp. 41–43. https://doi.org/10.1109/icit.2007.32
Monoth, T., Babu Anto, P.: Contrast-enhanced visual cryptography schemes based on perfect reconstruction of white pixels and additional basis matrix. In: Computational Intelligence, Cyber Security and Computational Models, Advances in Intelligent Systems and Computing, vol. 412, pp. 361–368. Springer, Singapore (2016)
Monoth, T.: Contrast-enhanced recursive visual cryptography scheme based on additional basis matrices. In: Satapathy, S., Bhateja, V., Das, S. (eds.) Smart Intelligent Computing and Applications. Smart Innovation, Systems and Technologies, vol. 105. Springer, Singapore (2019)
Mohan, A., Binu, V.P.: Quality improvement in Color Extended Visual Cryptography using ABM and PRWP. In: International Conference on Data Mining and Advanced Computing (SAPIENCE). IEEE Xplore (2016). https://doi.org/10.1109/sapience.2016.7684159
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jisha, T.E., Monoth, T. (2021). Optimal Contrast and Size-Invariant Recursive VCS Using Perfect Reconstruction of White Pixels. In: Bhateja, V., Peng, SL., Satapathy, S.C., Zhang, YD. (eds) Evolution in Computational Intelligence. Advances in Intelligent Systems and Computing, vol 1176. Springer, Singapore. https://doi.org/10.1007/978-981-15-5788-0_17
Download citation
DOI: https://doi.org/10.1007/978-981-15-5788-0_17
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5787-3
Online ISBN: 978-981-15-5788-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)