Abstract
The weighted visual cryptographic scheme (WVCS) allows the dealer to assign a weight to every shadow (participant) according to the participant’s importance so that the ability of each shadow to reveal a secret image can be varied. However, the previous weighted random grid-based VCS (WRGVCS) has the shortcoming of low visual quality. The contribution of this paper is that a new WRGVCS for a (k, n) threshold is designed to improve the image quality of the revealed secret image and to realize more features. RG is utilized to achieve the features of no pixel expansion and no codebook design. The probability of covering the valid bits is improved to improve the image quality. Experimental results and security analyses indicate the effectiveness of the designed scheme. Contrast and feature comparisons with previous weighted VCS approaches exhibit improvements in the designed scheme over other relative weighted VCSs. The limitations of our work are that the weighted effect decreases for some thresholds, and the theoretical contrast of the designed scheme is not derived directly by the parameters.



Similar content being viewed by others
References
Al-Sharif S, Iqbal F, Baker T, Khattack A (2016) White-hat hacking framework for promoting security awareness. In: 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp 1–6
Alloghani M, Alani MM, Al-Jumeily D, Baker T, Mustafina J, Hussain A, Aljaaf AJ (2019) A systematic review on the status and progress of homomorphic encryption technologies. J Inf Secur Appl 48:102362
Al Sharif S, Al Ali M, Al Reqabi N, Iqbal F, Baker T, Marrington A (2016) Magec: An image searching tool for detecting forged images in forensic investigation. In: 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp 1–6
Chao HCFTY (2017) Random-grid based progressive visual secret sharing scheme with adaptive priority. Digital Signal Processing, pp 69–80
Cheng Y, Fu Z, Yu B, Shen G (2017) A new two-level qr code with visual cryptography scheme. Multimedia Tools and Applications
El-Latif AAA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access
Fuyou M, Yan X, Xingfu W, Badawy M (2015) Randomized component and its application to (t, m, n)-group oriented secret sharing. IEEE Trans Inf Forensic Secur 10(5):889–899
Gurunathan K, Rajagopalan SP (2019) A stegano - visual cryptography technique for multimedia security. Multimedia Tools and Applications
Hou YC, Quan ZY, Tsai CF (2015) A privilege-based visual secret sharing model. Academic Press Inc.
Jia X, Wang D, Nie D, Luo X, Sun JZ (2019) A new threshold changeable secret sharing scheme based on the chinese remainder theorem. Inf Sci 473:13–30
Jia X, Wang D, Chu Q, Chen Z (2019) An efficient xor-based verifiable visual cryptographic scheme. Multimed Tools Appl 78(7):8207–8223
Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377–379
Li P, Liu Z, Yang CN (2018) A construction method of (t,k,n)-essential secret image sharing scheme. Signal Process Image Commun 65:210 – 220
Li Y, Guo L (2018) Robust image fingerprinting via distortion-resistant sparse coding. IEEE Signal Process Lett 25(1):140–144
Liu Y, Yang C, Wang Y, Zhu L, Ji W (2018) Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf Sci 45:321–29
Liu X, Wang S, Sang J, Zhang W (2018) A novel lossless recovery algorithm for basic matrix-based vss. Multimed Tools Appl 77(13):16461–16476
Liu X, Wang S, Yan X, Zhang W (2018) Random grid-based threshold visual secret sharing with improved visual quality and lossless recovery ability. Multimed Tools Appl 77(16):20673–20696
Liu F, Yan X, Liu L, Lu Y, Tan L (2019) Weighted visual secret sharing with multiple decryptions and lossless recovery. Math Biosci Eng 16(mbe-16-05-287):5750
Naor M, Shamir A (1995) Visual cryptography. In: Advances in cryptology-EUROCRYPT’94 lecture notes in computer science, workshop on the theory and application of cryptographic techniques. Springer, Perugia, pp 1–12
Praveen K, Sethumadhavan M (2018) Cheating immune visual cryptographic scheme with reduced pixel expansion. In: Saeed K, Chaki N, Pati B, Bakshi S, Mohapatra D.P (eds) Progress in Advanced Computing and Intelligent Engineering. Springer Singapore, Singapore, pp 257–265
Shyu SJ (2018) Xor-based visual cryptographic schemes with monotonously increasing and flawless reconstruction properties. IEEE Trans Circ Syst Video Technol 28(9):2397–2401
Tan L, Lu Y, Yan X, Liu L, Li L (2019) Weighted secret image sharing for a (k, n) threshold based on the chinese remainder theorem. IEEE Access 7:59278–59286
Wang Z, Arce GR, Di Crescenzo G (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensic Secur 4(3):383–396
Wang G, Liu F, Yan WQ (2016) Basic visual cryptography using braille. Int J Digit Crime Forensic 8(3):85–93
Yang CN, Wu CC, Wang DS (2014) A discussion on the relationship between probabilistic visual cryptography and random grid. Inf Sci 278:141–173
Yan X, Wang S, Niu X (2014) Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Process 105:389–398
Yan X, Lu Y, Huang H, Liu L, Wan S (2016) Clarity corresponding to contrast in visual cryptography. Social Computing: Second International Conference of Young Computer Scientists, Engineers and Educators, ICYCSEE 2016. Proceedings, Part I, Harbin, pp 249–257
Yang CN, Liao JK, Wang DS (2017) New privilege-based visual cryptography with arbitrary privilege levels. J Vis Commun Image Represent 42:121–131
Yan X, Liu X, Yang CN (2018) An enhanced threshold visual secret sharing based on random grids. J Real-Time Image Proc 14(1):61–73
Yan X, Lu Y (2018) Progressive visual secret sharing for general access structure with multiple decryptions. Multimed Tools Appl 77(2):2653–2672
Acknowledgments
The authors would like to thank the anonymous reviewers for their valuable comments. This work is supported by the National Natural Science Foundation of China (Grant Number: 61602491) and the Key Program of the National University of Defense Technology (Grant Number: ZK-17-02-07).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yan, X., Liu, F., Yan, W.Q. et al. Weighted visual cryptographic scheme with improved image quality. Multimed Tools Appl 79, 21345–21360 (2020). https://doi.org/10.1007/s11042-020-08970-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08970-y