Abstract
Visual secret sharing (VSS) is a noteworthy variant of secret sharing. One special property of VSS is that the security of VSS is achieved by loosing the contrast and the resolution of the secret image. Generally, the reconstructed secrets of these schemes are considered to be visible if and only if the contrast is greater than 0. However, VSS is based on the human vision system (HVS), thus the visibility is not only dependent on the contract. In this paper, we discuss the limit of human vision for VSS (LHV-VSS), because HVS is actually complicated. We take several human vision parameters into consideration, and propose a profile to analyze the upper bound of n for k-out-of-n VSS schemes based on the just noticeable difference (JND) profile. We conclude some cases of VSS schemes are invisible practically according to the analyses. Finally, we give a definition for VSS, visibility condition.
Similar content being viewed by others
Notes
Readers can refer to a book chapter of Chen et al. [5] for more details. It deeply discusses cheating prevention in VSS.
This depends on the size of the secret image and the VSS schemes.
References
Ateniese G, Blundo C, De Santis A, Stinson DR (2001) Extended capabilities for visual cryptography. Theor Comput Sci 250(1–2):143–161
Blundo C, Arco PD, De Santis A, Stinson DR (2003) Contrast optimal threshold visual cryptography schemes. SIAM J Discrete Math 16(2):224–261
Blundo C, De Santis A, Naor M (2000) Visualcryptography for grey level images. Inf Process Lett 76(6):255–259
Blundo C, De Santis A, Stinson DR (1999) On the contrast in visual cryptography schemes. J Cryptol 12:261–289
Chen YC, Horng G, Tsai DS (2011) Cheating prevention visual cryptography. Visual Cryptography and Secret Image Sharing, CRC press, ISBN: 9781439837214
Chou CH, Li YC (1995) A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile. IEEE Trans Circuits Syst Video Technol 5(6):467–476
De Prisco R, De Santis A (2010) Cheating immune threshold visual secret sharing. Comput J 53:1485–1496
Droste S (1996) New results on visual cryptography. In: Proceedings of advances in cryptography-CRYOT’96. LNCS, vol 1109, pp 401–415
Hofmeister T, Krause M, Simon HU (2000) Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor Comput Sci 240(2):471–485
Horng G, Chen TH, Tsai DS (2006) Cheating in visual cryptography. Designs Codes Cryptogr 38(2):219–236
Hu CM, Tzeng WG (2007) Cheating prevention in visual cryptography. IEEE Trans Image Process 16(1):36–45
Jayant N (1992) Signal compression: technology targets and research directions. IEEE J Sel Areas Commun 10:314–323
Lu S, Manchala D, Ostrovsky R (2011) Visual cryptography on graphs. J Comb Optim 21(1):41–66
Naor M, Shamir A (1994) Visual cryptography. In: Proceedings of advances in cryptography-EUROCRYOT’94. LNCS, vol 950, pp 1–12
Shamir A (1979) How to share a secret. Commun ACM 22:612–613
Tsai DS, Chen TH, Horng G (2007) A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recogn 40(8):2356–2366
Weir J, Yan W (2010) A comprehensive study of visual cryptography. In: Transactions on Data Hiding and Multimedia Security V, LNCS, vol 6010, pp 70–105
Yang CN, Chung TH (2010) A general multi-secret visual cryptography scheme. Opt Commun 283(24):4949–4962
Zhou Z, Arce GR, Crescenzo GD (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453
Acknowledgements
This work was partially supported by the National Science Council, Taiwan, R.O.C., under contract No. NSC100-2221-E-164-010.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tsai, DS., Chen, YC. Visibility bounds for visual secret sharing based on JND theory. Multimed Tools Appl 70, 1825–1836 (2014). https://doi.org/10.1007/s11042-012-1206-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-012-1206-x