Skip to main content
Log in

Weighted visual cryptographic scheme with improved image quality

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The weighted visual cryptographic scheme (WVCS) allows the dealer to assign a weight to every shadow (participant) according to the participant’s importance so that the ability of each shadow to reveal a secret image can be varied. However, the previous weighted random grid-based VCS (WRGVCS) has the shortcoming of low visual quality. The contribution of this paper is that a new WRGVCS for a (k, n) threshold is designed to improve the image quality of the revealed secret image and to realize more features. RG is utilized to achieve the features of no pixel expansion and no codebook design. The probability of covering the valid bits is improved to improve the image quality. Experimental results and security analyses indicate the effectiveness of the designed scheme. Contrast and feature comparisons with previous weighted VCS approaches exhibit improvements in the designed scheme over other relative weighted VCSs. The limitations of our work are that the weighted effect decreases for some thresholds, and the theoretical contrast of the designed scheme is not derived directly by the parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Al-Sharif S, Iqbal F, Baker T, Khattack A (2016) White-hat hacking framework for promoting security awareness. In: 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp 1–6

  2. Alloghani M, Alani MM, Al-Jumeily D, Baker T, Mustafina J, Hussain A, Aljaaf AJ (2019) A systematic review on the status and progress of homomorphic encryption technologies. J Inf Secur Appl 48:102362

  3. Al Sharif S, Al Ali M, Al Reqabi N, Iqbal F, Baker T, Marrington A (2016) Magec: An image searching tool for detecting forged images in forensic investigation. In: 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp 1–6

  4. Chao HCFTY (2017) Random-grid based progressive visual secret sharing scheme with adaptive priority. Digital Signal Processing, pp 69–80

  5. Cheng Y, Fu Z, Yu B, Shen G (2017) A new two-level qr code with visual cryptography scheme. Multimedia Tools and Applications

  6. El-Latif AAA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access

  7. Fuyou M, Yan X, Xingfu W, Badawy M (2015) Randomized component and its application to (t, m, n)-group oriented secret sharing. IEEE Trans Inf Forensic Secur 10(5):889–899

    Article  Google Scholar 

  8. Gurunathan K, Rajagopalan SP (2019) A stegano - visual cryptography technique for multimedia security. Multimedia Tools and Applications

  9. Hou YC, Quan ZY, Tsai CF (2015) A privilege-based visual secret sharing model. Academic Press Inc.

  10. Jia X, Wang D, Nie D, Luo X, Sun JZ (2019) A new threshold changeable secret sharing scheme based on the chinese remainder theorem. Inf Sci 473:13–30

  11. Jia X, Wang D, Chu Q, Chen Z (2019) An efficient xor-based verifiable visual cryptographic scheme. Multimed Tools Appl 78(7):8207–8223

    Article  Google Scholar 

  12. Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377–379

    Article  Google Scholar 

  13. Li P, Liu Z, Yang CN (2018) A construction method of (t,k,n)-essential secret image sharing scheme. Signal Process Image Commun 65:210 – 220

  14. Li Y, Guo L (2018) Robust image fingerprinting via distortion-resistant sparse coding. IEEE Signal Process Lett 25(1):140–144

    Article  Google Scholar 

  15. Liu Y, Yang C, Wang Y, Zhu L, Ji W (2018) Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf Sci 45:321–29

  16. Liu X, Wang S, Sang J, Zhang W (2018) A novel lossless recovery algorithm for basic matrix-based vss. Multimed Tools Appl 77(13):16461–16476

    Article  Google Scholar 

  17. Liu X, Wang S, Yan X, Zhang W (2018) Random grid-based threshold visual secret sharing with improved visual quality and lossless recovery ability. Multimed Tools Appl 77(16):20673–20696

    Article  Google Scholar 

  18. Liu F, Yan X, Liu L, Lu Y, Tan L (2019) Weighted visual secret sharing with multiple decryptions and lossless recovery. Math Biosci Eng 16(mbe-16-05-287):5750

    Article  MathSciNet  Google Scholar 

  19. Naor M, Shamir A (1995) Visual cryptography. In: Advances in cryptology-EUROCRYPT’94 lecture notes in computer science, workshop on the theory and application of cryptographic techniques. Springer, Perugia, pp 1–12

  20. Praveen K, Sethumadhavan M (2018) Cheating immune visual cryptographic scheme with reduced pixel expansion. In: Saeed K, Chaki N, Pati B, Bakshi S, Mohapatra D.P (eds) Progress in Advanced Computing and Intelligent Engineering. Springer Singapore, Singapore, pp 257–265

  21. Shyu SJ (2018) Xor-based visual cryptographic schemes with monotonously increasing and flawless reconstruction properties. IEEE Trans Circ Syst Video Technol 28(9):2397–2401

    Article  Google Scholar 

  22. Tan L, Lu Y, Yan X, Liu L, Li L (2019) Weighted secret image sharing for a (k, n) threshold based on the chinese remainder theorem. IEEE Access 7:59278–59286

    Article  Google Scholar 

  23. Wang Z, Arce GR, Di Crescenzo G (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensic Secur 4(3):383–396

    Article  MATH  Google Scholar 

  24. Wang G, Liu F, Yan WQ (2016) Basic visual cryptography using braille. Int J Digit Crime Forensic 8(3):85–93

    Article  Google Scholar 

  25. Yang CN, Wu CC, Wang DS (2014) A discussion on the relationship between probabilistic visual cryptography and random grid. Inf Sci 278:141–173

    Article  MathSciNet  MATH  Google Scholar 

  26. Yan X, Wang S, Niu X (2014) Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Process 105:389–398

    Article  Google Scholar 

  27. Yan X, Lu Y, Huang H, Liu L, Wan S (2016) Clarity corresponding to contrast in visual cryptography. Social Computing: Second International Conference of Young Computer Scientists, Engineers and Educators, ICYCSEE 2016. Proceedings, Part I, Harbin, pp 249–257

  28. Yang CN, Liao JK, Wang DS (2017) New privilege-based visual cryptography with arbitrary privilege levels. J Vis Commun Image Represent 42:121–131

    Article  Google Scholar 

  29. Yan X, Liu X, Yang CN (2018) An enhanced threshold visual secret sharing based on random grids. J Real-Time Image Proc 14(1):61–73

    Article  Google Scholar 

  30. Yan X, Lu Y (2018) Progressive visual secret sharing for general access structure with multiple decryptions. Multimed Tools Appl 77(2):2653–2672

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to thank the anonymous reviewers for their valuable comments. This work is supported by the National Natural Science Foundation of China (Grant Number: 61602491) and the Key Program of the National University of Defense Technology (Grant Number: ZK-17-02-07).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuehu Yan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yan, X., Liu, F., Yan, W.Q. et al. Weighted visual cryptographic scheme with improved image quality. Multimed Tools Appl 79, 21345–21360 (2020). https://doi.org/10.1007/s11042-020-08970-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08970-y

Keywords

Navigation