Abstract
Visual secret sharing (VSS) technology encodes a secret image into some share images for sharing some classified information. Only when the participants gather and stack their share pictures the secret image would be reconstructed and recognizable by the human visual system. Two well-known encoding ways of VSS, visual cryptography (VC) and random grid (RG), have been developed in recent years. As both VC and RG have been considered as a secure way for communicating with high security, they have been pointed out with cheating problems. In this paper, we propose two RG-based VSS schemes with fraud prevention for the cases of (2,n) and (k,n). The experimental results and the analysis of security and contrast show that the proposed method is efficient and practical.
Similar content being viewed by others
References
Blundo C, De Bonis A, De Santis A (2001) Improved schemes for visual cryptography. Des Codes Crypt 24:255–278
Chang, CC, Chuang JC, Lin PY (2005) Sharing a secret two-tone image in two gray-level images. Proceedings of the 11th International Conference on Parallel and Distributed Systems, pp. 300-304
Chen TH, Tsao KH (2008) Image encryption by (n,n) random grids. Proceedings of 18th Information Security Conference, Hualien
Chen TH, Tsao KH (2009) Visual secret sharing by random grids revisited. Pattern Recogn 42(9):2203–2217
Chen TH, Tsao KH (2011) Threshold visual secret sharing by random grids. J Syst Softw 84(7):1197–1208
Eisen PA, Stinson DR (2002) Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. Des Codes Crypt 25(1):15–61
Fang WP (2009) Non-expansion visual secret sharing in reversible style. International Journal of Computer Science and Network Security 9(2):204–208
Fang WP, Lin JC (2006) Visual cryptography with extra ability of hiding confidential data. Journal of Electronic Imaging 15(2):0230201–0230207
Horng GB, Chen TH, Tsai DS (2006) Cheating in Visual Cryptography. Des Codes Crypt 38(2):219–236
Hu CM, Tzeng WG (2007) Cheating Prevention in Visual Cryptography. IEEE Trans Image Process 16(1):36–45
Huang JC, Jeng FG, Chen TH (2017) A new buyer-seller watermarking protocol without multiple watermarks insertion. Multimedia Tools and Applications 76(7):9667–9679
Ito R, Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE Transactions Fundamentals E82-A(10)
Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377–379
Lee YS, Chen TH (2012) Insight into collusion attacks in random-grid-based visual secret sharing. Signal Process 92(3):727–736
Lin CH, Lee YS, Chen TH (2015) Friendly progressive random-grid-based visual secret sharing with adaptive contrast. J Vis Commun Image Represent 33:31–44
Lin KS, Lin CH, Chen TH (2014) Distortionless visual multi-secret sharing based on random grids. Inf Sci 288(1):330–346
Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recogn 38(5):767–772
Naor M, Pinkas B (1997) Visual authentication and identification. Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, Lecture Notes in Computer Science, Vol. 1294, Santa Barbara, California, USA, pp. 322-336
Naor M, Shamir A (1995) Visual cryptography. Proceedings of Advances in Cryptology: Eurocrypt94, Lecture Notes in Computer Science, pp. 1-12
Prisco RD, Santis AD (2006) Cheating Immine (2,n)-Threshold Visual Secret Sharing Scheme. Security and Cryptography for Networks, Lecture Notes in Computer Science, 4116
Shyu SJ (2007) Image encryption by random grids. Pattern Recogn 40(3):1014–1031
Tsai DS, Chen TH, Horng G (2007) A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recogn 40(8):2356–2366
Tsai DS, Horng G (2007) Cheating in Visual Cryptography Revisited. Proceedings of 17th Information Security Conference, pp. 769-771
Tu SF, Hsu CS (2009) "Digital watermarking method based on image size invariant visual cryptographic scheme," Proceedings of Symposia and Workshops on 9th Ubiquitous. Autonomic and Trusted Computing 2009:362–366
Vashistha A, Nallusamy R, Das A, Paul S (2010) Watermarking video content using visual cryptography and scene averaged image. Proceedings of IEEE International Conference on Multimedia and Expo 2010:1641–1646
Wu XT, Sun W (2012) Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J Syst Softw 85(5):1119–1134
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Wang, BJ., Chen, TS., Jeng, FG. et al. On the security of threshold random grid-based visual secret sharing. Multimed Tools Appl 78, 10157–10180 (2019). https://doi.org/10.1007/s11042-018-6478-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6478-3