ABSTRACT
In recent years, random grid (RG) received much attention for constructing visual secret sharing (VSS) scheme without pixel expansion. But recovered secret image with low visual quality reveals due to the stacking operation. To improve the recovered image quality, XOR-based VSS is adopted. However, shares constructed from XOR-based VSS are random-looking. The noise-like appearance further increases the chance of suspicion on secret image communication and imposes difficulty for managing the shares. In this work, a novel (2,2) generalized RG-based VSS is introduced. By adopting the (2,2) VSS, we propose a XOR-based meaningful VSS where shares with meaningful contents are constructed. Moreover, superior visual quality is provided by this method as well.
- G. Ateniese, C. Blundo, A. De Santis, and D. Stinson. Visual Cryptography for General Access Structures. Information and Computation, 129(2):86--106, 1996. Google ScholarDigital Library
- G. Ateniese, C. Blundo, A. Santis, and D. Stinson. Extended capabilities for visual cryptography. Theoretical Computer Science, 250(1-2):143--161, 2001. Google ScholarDigital Library
- C. Blundo, A. De Santis, and D. Stinson. On the contrast in visual cryptography schemes. Journal of Cryptology, 12(4):241--289, 1999.Google ScholarDigital Library
- T. Chen and K. Tsao. Visual secret sharing by random grids revisited. Pattern Recognition, 42(9):2203--2217, 2009. Google ScholarDigital Library
- T. Chen and K. Tsao. Threshold visual secret sharing by random grids. Journal of Systems and Software, 84:1197--1208, 2011. Google ScholarDigital Library
- T. Chen and K. Tsao. User-friendly random-grid-based visual secret sharing. Circuits and Systems for Video Technology, IEEE Transactions on, 21(11):1693--1703, 2011. Google ScholarDigital Library
- S. Cimato, R. De Prisco, and A. De Santis. Probabilistic visual cryptography schemes. The Computer Journal, 49(1):97--107, 2006. Google ScholarDigital Library
- R. Ito, H. Kuwakado, and H. Tanaka. Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 82(10):2172--2177, 1999.Google Scholar
- O. Kafri and E. Keren. Encryption of pictures and shapes by random grids. Optics letters, 12(6):377--379, 1987.Google ScholarCross Ref
- I. Kang, G. Arce, and H. Lee. Color extended visual cryptography using error diffusion. Image Processing, IEEE Transactions on, 20(1):132--145, 2011. Google ScholarDigital Library
- C. Lin and W. Tsai. Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters, 24(1-3):349--358, 2003. Google ScholarDigital Library
- C. Lin and W. Tsai. Secret image sharing with steganography and authentication. Journal of Systems and Software, 73(3):405--414, 2004. Google ScholarDigital Library
- F. Liu and C. Wu. Embedded extended visual cryptography schemes. Information Forensics and Security, IEEE Transactions on, 6(2):307--322, 2011. Google ScholarDigital Library
- M. Naor and A. Shamir. Visual cryptography. Lecture Notes in Computer Science, 950(1):1--12, 1995.Google Scholar
- S. Shyu. Image encryption by random grids. Pattern Recognition, 40(3):1014--1031, 2007. Google ScholarDigital Library
- S. Shyu. Image encryption by multiple random grids. Pattern Recognition, 42(7):1582--1596, 2009. Google ScholarDigital Library
- C. Thien and J. Lin. Secret image sharing. Computers & Graphics, 26(5):765--770, 2002.Google ScholarCross Ref
- P. Tuyls, H. Hollmann, J. Lint, and L. Tolhuizen. Xor-based visual cryptography schemes. Designs, Codes and Cryptography, 37(1):169--186, 2005. Google ScholarDigital Library
- Z. Wang, G. Arce, and G. Di Crescenzo. Halftone visual cryptography via error diffusion. Information Forensics and Security, IEEE Transactions on, 4(3):383--396, 2009. Google ScholarDigital Library
- X. Wu and W. Sun. Visual secret sharing for general access structures by random grids. IET information security, 6(4):299--309, 2012.Google Scholar
- X. Wu and W. Sun. Improving the visual quality of random grid-based visual secret sharing. Signal Processing, 93(5):977--995, 2013. Google ScholarDigital Library
- X. Wu and W. Sun. Random grid-based visual secret sharing with abilities of or and xor decryptions. Journal of Visual Communication and Image Representation, 24(1):48--62, 2013. Google ScholarDigital Library
- C. Yang. New visual secret sharing schemes using probabilistic method. Pattern Recognijion Letters, 25(4):486--494, 2004. Google ScholarDigital Library
- Z. Zhou, G. Arce, and G. Di Crescenzo. Halftone visual cryptography. Image Processing, IEEE Transactions on, 15(8):2441--2453, 2006. Google ScholarDigital Library
Index Terms
- XOR-based meaningful visual secret sharing by generalized random grids
Recommendations
Improved schemes for visual secret sharing based on random grids
Random grid (RG) is an alternative approach to realize a visual secret sharing (VSS) scheme. RG-based VSS has merits such as no pixel expansion and no tailor-made matrix requirement. Recently, many investigations on RG-based VSS are made. However, they ...
Random grid-based visual secret sharing with abilities of OR and XOR decryptions
Random grid (RG) is a methodology to construct visual secret sharing (VSS) scheme without pixel expansion. In some reported RG-based VSS schemes, a secret image can be visually reconstructed only by stacking operation, even thought some light-weight ...
Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and CommunicationVisual secret sharing (VSS) schemes have been proposed by Naor and Shamir [1] in 1995. It encodes a binary secret image into several meaningless images called shares or transparencies. The secret image can be obtained by stacking the qualified set of ...
Comments