skip to main content
10.1145/2482513.2482515acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

XOR-based meaningful visual secret sharing by generalized random grids

Published:17 June 2013Publication History

ABSTRACT

In recent years, random grid (RG) received much attention for constructing visual secret sharing (VSS) scheme without pixel expansion. But recovered secret image with low visual quality reveals due to the stacking operation. To improve the recovered image quality, XOR-based VSS is adopted. However, shares constructed from XOR-based VSS are random-looking. The noise-like appearance further increases the chance of suspicion on secret image communication and imposes difficulty for managing the shares. In this work, a novel (2,2) generalized RG-based VSS is introduced. By adopting the (2,2) VSS, we propose a XOR-based meaningful VSS where shares with meaningful contents are constructed. Moreover, superior visual quality is provided by this method as well.

References

  1. G. Ateniese, C. Blundo, A. De Santis, and D. Stinson. Visual Cryptography for General Access Structures. Information and Computation, 129(2):86--106, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. G. Ateniese, C. Blundo, A. Santis, and D. Stinson. Extended capabilities for visual cryptography. Theoretical Computer Science, 250(1-2):143--161, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Blundo, A. De Santis, and D. Stinson. On the contrast in visual cryptography schemes. Journal of Cryptology, 12(4):241--289, 1999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. T. Chen and K. Tsao. Visual secret sharing by random grids revisited. Pattern Recognition, 42(9):2203--2217, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. T. Chen and K. Tsao. Threshold visual secret sharing by random grids. Journal of Systems and Software, 84:1197--1208, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. T. Chen and K. Tsao. User-friendly random-grid-based visual secret sharing. Circuits and Systems for Video Technology, IEEE Transactions on, 21(11):1693--1703, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Cimato, R. De Prisco, and A. De Santis. Probabilistic visual cryptography schemes. The Computer Journal, 49(1):97--107, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Ito, H. Kuwakado, and H. Tanaka. Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 82(10):2172--2177, 1999.Google ScholarGoogle Scholar
  9. O. Kafri and E. Keren. Encryption of pictures and shapes by random grids. Optics letters, 12(6):377--379, 1987.Google ScholarGoogle ScholarCross RefCross Ref
  10. I. Kang, G. Arce, and H. Lee. Color extended visual cryptography using error diffusion. Image Processing, IEEE Transactions on, 20(1):132--145, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Lin and W. Tsai. Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters, 24(1-3):349--358, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Lin and W. Tsai. Secret image sharing with steganography and authentication. Journal of Systems and Software, 73(3):405--414, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. F. Liu and C. Wu. Embedded extended visual cryptography schemes. Information Forensics and Security, IEEE Transactions on, 6(2):307--322, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Naor and A. Shamir. Visual cryptography. Lecture Notes in Computer Science, 950(1):1--12, 1995.Google ScholarGoogle Scholar
  15. S. Shyu. Image encryption by random grids. Pattern Recognition, 40(3):1014--1031, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Shyu. Image encryption by multiple random grids. Pattern Recognition, 42(7):1582--1596, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. C. Thien and J. Lin. Secret image sharing. Computers & Graphics, 26(5):765--770, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  18. P. Tuyls, H. Hollmann, J. Lint, and L. Tolhuizen. Xor-based visual cryptography schemes. Designs, Codes and Cryptography, 37(1):169--186, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Z. Wang, G. Arce, and G. Di Crescenzo. Halftone visual cryptography via error diffusion. Information Forensics and Security, IEEE Transactions on, 4(3):383--396, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. X. Wu and W. Sun. Visual secret sharing for general access structures by random grids. IET information security, 6(4):299--309, 2012.Google ScholarGoogle Scholar
  21. X. Wu and W. Sun. Improving the visual quality of random grid-based visual secret sharing. Signal Processing, 93(5):977--995, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. X. Wu and W. Sun. Random grid-based visual secret sharing with abilities of or and xor decryptions. Journal of Visual Communication and Image Representation, 24(1):48--62, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Yang. New visual secret sharing schemes using probabilistic method. Pattern Recognijion Letters, 25(4):486--494, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Z. Zhou, G. Arce, and G. Di Crescenzo. Halftone visual cryptography. Image Processing, IEEE Transactions on, 15(8):2441--2453, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. XOR-based meaningful visual secret sharing by generalized random grids

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IH&MMSec '13: Proceedings of the first ACM workshop on Information hiding and multimedia security
      June 2013
      242 pages
      ISBN:9781450320818
      DOI:10.1145/2482513

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 June 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      IH&MMSec '13 Paper Acceptance Rate27of74submissions,36%Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader