Skip to main content
Log in

Exploring recent advances in random grid visual cryptography algorithms

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Visual cryptography scheme is initiated to securely encode a secret image into multiple shares. The secret can be reconstructed by overlaying the shares, making it perceptible to the human visual system. Random grid visual cryptography offers key advantages over traditional visual cryptography such as avoiding pixel expansion and the requirement for intricate codebook design. This paper is intended to conduct a critical analysis and implementation of various algorithms in random grid visual cryptography from 2011 to 2022. The focal parameters of this study are theoretical contrast, experimental contrast and visual quality. Experiments were done on binary images for (k, n) algorithms considering different values of threshold. By implementing and analysing the results, the scheme which gives the optimal result is identified.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

The images supporting the study can be found in USC-SIPI Image Database.

References

  1. Naor, M., & Shamir, A. (1995). Visual cryptography. In Advances in Cryptology—EUROCRYPT’94: Workshop on the Theory and Application of Cryptographic Techniques Perugia, Italy, May 9–12, 1994 Proceedings 13 (pp. 1–12). Springer Berlin Heidelberg.

  2. Shyu SJ (2006) Efficient visual secret sharing scheme for color images. Pattern Recogn 39(5):866–880

    Article  Google Scholar 

  3. Shyu SJ (2009) Image encryption by multiple random grids. Pattern Recogn 42(7):1582–1596

    Article  Google Scholar 

  4. Chen TH, Tsao KH, Lee YS (2012) Yet another multiple-image encryption by rotating random grids. Signal Process 92(9):2229–2237

    Article  Google Scholar 

  5. Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377–379

    Article  Google Scholar 

  6. Francis N, Monoth T (2023) Security enhanced random grid visual cryptography scheme using master share and embedding method. Int J of Inf Technol 15(7):1–7

    Google Scholar 

  7. Chen TH, Tsao KH (2009) Visual secret sharing by random grids revisited. Pattern Recogn 42(9):2203–2217

    Article  Google Scholar 

  8. Shyu SJ (2007) Image encryption by random grids. Pattern Recogn 40(3):1014–1031

    Article  Google Scholar 

  9. Chen TH, Tsao KH (2011) Threshold visual secret sharing by random grids. J Syst Softw 84(7):1197–1208

    Article  Google Scholar 

  10. Chen, T. H., & Tsao, K. H. (2008). Image encryption by (n, n) random grids. In: Proceedings of 18th Information Security Conference, Hualien.

  11. Wu X, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93(5):977–995

    Article  Google Scholar 

  12. Lee YS, Wang BJ, Chen TH (2013) Quality-improved threshold visual secret sharing scheme by random grids. IET Image Proc 7(2):137–143

    Article  Google Scholar 

  13. Guo T, Liu F, Wu C (2013) Threshold visual secret sharing by random grids with improved contrast. J Syst Softw 86(8):2094–2109

    Article  Google Scholar 

  14. Yan X, Liu X, Yang CN (2018) An enhanced threshold visual secret sharing based on random grids. J Real-Time Image Proc 14:61–73

    Article  Google Scholar 

  15. Yan X, Wang S, Niu X, Yang CN (2015) Random grid-based visual secret sharing with multiple decryptions. J Vis Commun Image Represent 26:94–104

    Article  Google Scholar 

  16. Hu H, Shen G, Fu Z, Yu B (2018) Improved Contrast for Threshold Random-grid-based Visual Cryptography. KSII Trans on Int Inf Systems 12(7):3401–3420

    Google Scholar 

  17. Zhao Y, Fu FW (2022) A contrast improved OR and XOR based (k, n) visual cryptography scheme without pixel expansion. J Vis Commun Image Represent 82:103408

    Article  Google Scholar 

  18. Yan, X., Lu, Y., Huang, H., Liu, L., & Wan, S. (2016). Clarity corresponding to contrast in visual cryptography. In: Social Computing: Second International Conference of Young Computer Scientists, Engineers and Educators, ICYCSEE 2016, Harbin, China, August 20-22, 2016, Proceedings, Part I 2 (pp. 249-257), Springer, Singapore

Download references

Author information

Authors and Affiliations

Authors

Contributions

Authors 1 & 2 equally contributed to the manuscript and Author 3 supervised the work. All authors reviewed the manuscript.

Corresponding author

Correspondence to Neetha Francis.

Ethics declarations

Conflict of interest

The authors state that they have no financial/non-financial interests.

Ethical approval

Consent to participate has to be considered is not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Francis, N., Lisha, A. & Monoth, T. Exploring recent advances in random grid visual cryptography algorithms. J Supercomput 80, 23205–23224 (2024). https://doi.org/10.1007/s11227-024-06334-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-024-06334-z

Keywords