Skip to main content
Log in

Adaptive halftoned visual cryptography with improved quality and security

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Visual Cryptography Scheme (VCS) is a cryptographic technique which can hide image based secrets. Even though VCS has the major advantage that the decoding can be done with the help of Human Visual System (HVS), yet it does not provide sufficient reconstruction quality. Hence, Two in One Image Secret Sharing Scheme (TiOISSS) is used which provides two decoding phases. However, the existing TiOISSS method has several limitations. In this work, a Modified TiOISSS is proposed in which an adaptive threshold is used for halftoning, which changes depending on the nature of the pixels present in image. By this, the quality of reconstructed secret image is improved in the first decoding stage compared to the existing scheme. In addition, the security is also enhanced by pixel and bit level permutation with a 64 bit key and embedding the key in Gray VCS shadows. To verify the authenticity of the image, a secret message is also embedded in the shadows. Security analysis shows that the Modified TiOISSS is robust to Brute Force and Man-in-Middle attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Arumugam S, Lakshmanan R, Nagar AK (2014) On (k, n) visual cryptography scheme. J Des Codes Crypt 71(1):153–162

    Article  MathSciNet  MATH  Google Scholar 

  2. Arya KV, Rishiwal V, Yadav AK (2014) An efficient halftone visual secret sharing scheme, Proceedings of 9th International Conference on Industrial and Information Systems (ICIIS), 2014

  3. Askari N, Heys HM, Moloney CR (2013) An extended visual cryptography scheme without pixel expansion for halftone images, Proceedings of 26th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2013

  4. Chen T-H, Tsao K-H (2011) User-friendly random-grid-based visual secret sharing. IEEE Trans Circ Syst Video Technol 21(11):1693–1703

    Article  Google Scholar 

  5. Guo T, Liu F, Wu CK (2013) Threshold visual secret sharing by random grids with improved contrast. J Syst Softw 86(8):2094–2109

    Article  Google Scholar 

  6. Lee C-C, Chen H-H, Liu H-T, Chen G-W, Tsai C-S (2014) A new visual cryptography with multi-level encoding. J Vis Lang Comput 25(3):243–250

    Article  Google Scholar 

  7. Leng L, Beng A, Jin T (2015) Alignment-free row-co-occurrence cancelable palmprint Fuzzy vault. Pattern Recogn 48(7):2290–2303

    Article  Google Scholar 

  8. Lia P, Maa P-J, Sua X-H, Yang C-N (2012) Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J Vis Commun Image Represent 23(3):441–453

    Article  Google Scholar 

  9. Lin S-J, Lin J-C (2007) VCPSS:A two-in-one two-decoding options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. J Pattern Recognit Lett 40(12):3652–3666

    Article  MATH  Google Scholar 

  10. Lin C-C, Tsai W-H (2002) Visual cryptography for gray-level images by dithering techniques. J Pattern Recognit Lett 24(4):349–358

    MathSciNet  MATH  Google Scholar 

  11. Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y- H, Ray-Shine R, Jui-Lin L, Rong-Jian C (2010) Novel multiple secret sharing. J Expert Syst Appl 37(12):7858–7869

    Article  Google Scholar 

  12. Liu F, Yan WQ, Li P, Wu C (2014) ESSVCS: an enriched secret sharing visual cryptography. Trans Data Hiding Multimed Secur IX 8363:1–24

    Article  MATH  Google Scholar 

  13. Naor M, Shamir A (1994) Visual cryptography, Alfredo De Santis (ed), Advances in cryptology proceedings of Eurocypto’94, lecture notes in computer science, vol. 950, pp. 1–12

  14. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  15. Thien C-C, Lin J-C (2002) Secret image sharing. J Comput Graph 26(5):765–770

    Article  Google Scholar 

  16. Wang D, Yi F, Li X (2009) On general construction for extended visual cryptography schemes. J Pattern Recognit 42(11):3071–3082

    Article  MATH  Google Scholar 

  17. Wang Y, Wong K-W, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. J Appl Soft Comput 11:514–522

    Article  Google Scholar 

  18. Wu H-C, Chan C-C (2005) Sharing visual multi-secrets using circle shares. J Comput Stand Interfaces 28(1):123–135

    Article  Google Scholar 

  19. Yang C-N, Ciou C-B (2010) Image secret sharing method with two-decoding- options: lossless recovery and previewing capability. J Image Vision Comput 28(12):1600–1610

    Article  Google Scholar 

  20. Yang C-N, Yang Y-Y (2014) New extended visual cryptography schemes with clearer shadow images. J Inf Sci 271(4):246–263

    Article  MathSciNet  MATH  Google Scholar 

  21. Yang C-N, Chen P-W, Shih H-W, Kim C (2013) Aspect ratio invariant visual cryptography by image filtering and resizing. J Pers Ubiquit Comput 17(5):843–850

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gnanou Florence Sudha.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sridhar, S., Sathishkumar, R. & Sudha, G.F. Adaptive halftoned visual cryptography with improved quality and security. Multimed Tools Appl 76, 815–834 (2017). https://doi.org/10.1007/s11042-015-3066-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3066-7

Keywords

Navigation