Skip to main content
Log in

On the security of threshold random grid-based visual secret sharing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Visual secret sharing (VSS) technology encodes a secret image into some share images for sharing some classified information. Only when the participants gather and stack their share pictures the secret image would be reconstructed and recognizable by the human visual system. Two well-known encoding ways of VSS, visual cryptography (VC) and random grid (RG), have been developed in recent years. As both VC and RG have been considered as a secure way for communicating with high security, they have been pointed out with cheating problems. In this paper, we propose two RG-based VSS schemes with fraud prevention for the cases of (2,n) and (k,n). The experimental results and the analysis of security and contrast show that the proposed method is efficient and practical.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Blundo C, De Bonis A, De Santis A (2001) Improved schemes for visual cryptography. Des Codes Crypt 24:255–278

    Article  MathSciNet  Google Scholar 

  2. Chang, CC, Chuang JC, Lin PY (2005) Sharing a secret two-tone image in two gray-level images. Proceedings of the 11th International Conference on Parallel and Distributed Systems, pp. 300-304

  3. Chen TH, Tsao KH (2008) Image encryption by (n,n) random grids. Proceedings of 18th Information Security Conference, Hualien

  4. Chen TH, Tsao KH (2009) Visual secret sharing by random grids revisited. Pattern Recogn 42(9):2203–2217

    Article  Google Scholar 

  5. Chen TH, Tsao KH (2011) Threshold visual secret sharing by random grids. J Syst Softw 84(7):1197–1208

    Article  Google Scholar 

  6. Eisen PA, Stinson DR (2002) Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. Des Codes Crypt 25(1):15–61

    Article  MathSciNet  Google Scholar 

  7. Fang WP (2009) Non-expansion visual secret sharing in reversible style. International Journal of Computer Science and Network Security 9(2):204–208

    Google Scholar 

  8. Fang WP, Lin JC (2006) Visual cryptography with extra ability of hiding confidential data. Journal of Electronic Imaging 15(2):0230201–0230207

    Article  Google Scholar 

  9. Horng GB, Chen TH, Tsai DS (2006) Cheating in Visual Cryptography. Des Codes Crypt 38(2):219–236

    Article  MathSciNet  Google Scholar 

  10. Hu CM, Tzeng WG (2007) Cheating Prevention in Visual Cryptography. IEEE Trans Image Process 16(1):36–45

    Article  MathSciNet  Google Scholar 

  11. Huang JC, Jeng FG, Chen TH (2017) A new buyer-seller watermarking protocol without multiple watermarks insertion. Multimedia Tools and Applications 76(7):9667–9679

    Article  Google Scholar 

  12. Ito R, Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE Transactions Fundamentals E82-A(10)

  13. Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377–379

    Article  Google Scholar 

  14. Lee YS, Chen TH (2012) Insight into collusion attacks in random-grid-based visual secret sharing. Signal Process 92(3):727–736

    Article  Google Scholar 

  15. Lin CH, Lee YS, Chen TH (2015) Friendly progressive random-grid-based visual secret sharing with adaptive contrast. J Vis Commun Image Represent 33:31–44

    Article  Google Scholar 

  16. Lin KS, Lin CH, Chen TH (2014) Distortionless visual multi-secret sharing based on random grids. Inf Sci 288(1):330–346

    Article  MathSciNet  Google Scholar 

  17. Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recogn 38(5):767–772

    Article  Google Scholar 

  18. Naor M, Pinkas B (1997) Visual authentication and identification. Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, Lecture Notes in Computer Science, Vol. 1294, Santa Barbara, California, USA, pp. 322-336

  19. Naor M, Shamir A (1995) Visual cryptography. Proceedings of Advances in Cryptology: Eurocrypt94, Lecture Notes in Computer Science, pp. 1-12

  20. Prisco RD, Santis AD (2006) Cheating Immine (2,n)-Threshold Visual Secret Sharing Scheme. Security and Cryptography for Networks, Lecture Notes in Computer Science, 4116

  21. Shyu SJ (2007) Image encryption by random grids. Pattern Recogn 40(3):1014–1031

    Article  Google Scholar 

  22. Tsai DS, Chen TH, Horng G (2007) A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recogn 40(8):2356–2366

    Article  Google Scholar 

  23. Tsai DS, Horng G (2007) Cheating in Visual Cryptography Revisited. Proceedings of 17th Information Security Conference, pp. 769-771

  24. Tu SF, Hsu CS (2009) "Digital watermarking method based on image size invariant visual cryptographic scheme," Proceedings of Symposia and Workshops on 9th Ubiquitous. Autonomic and Trusted Computing 2009:362–366

    Google Scholar 

  25. Vashistha A, Nallusamy R, Das A, Paul S (2010) Watermarking video content using visual cryptography and scene averaged image. Proceedings of IEEE International Conference on Multimedia and Expo 2010:1641–1646

    Google Scholar 

  26. Wu XT, Sun W (2012) Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J Syst Softw 85(5):1119–1134

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tzung-Her Chen.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, BJ., Chen, TS., Jeng, FG. et al. On the security of threshold random grid-based visual secret sharing. Multimed Tools Appl 78, 10157–10180 (2019). https://doi.org/10.1007/s11042-018-6478-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6478-3

Keywords

Navigation