skip to main content
10.1145/3205651.3208767acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
abstract

Optimization based adaptive tagged visual cryptography

Published: 06 July 2018 Publication History

Abstract

The Tagged Visual Cryptography Scheme (TVCS)1 adds tag images to the noise-like shares generated by the traditional VCS to improve the shares management of the traditional VCS. However, the existing TVCSs suffers visual quality of the recovered secret image may be degraded and there may be pixel expansion. This study proposes a Threshold Adaptive Tagged Visual Cryptography Scheme ((k, n)-ATVCS) to solve the above-mentioned problems. The ATVCS encryption problem is formulated in a mathematical optimization model, and an evolutionary algorithm is developed to find the optimal solution to the problem. The proposed (k, n)-ATVCS enables the encryptor to adjust the visual quality between the tag image and the secret image by tuning parameters. Experimental results show the correctness and effectiveness of this study.

References

[1]
M. Naor, and A. Shamir, "Visual cryptography," Advances in Cryptology --- EUROCRYPT'94, Lecture Notes in Computer Science, pp. 1--12: Springer, 1995.
[2]
W. Ran-Zan, and H. Shuo-Fang, "Tagged visual cryptography," Signal Processing Letters, IEEE, vol. 18, no. 11, pp. 627--630, 2011.
[3]
X. Wu, and W. Sun, "Improved tagged visual cryptography by random grids," Signal Processing, vol. 97, pp. 64--82, 2014.
[4]
C. N. Yang, "New visual secret sharing schemes using probabilistic method," Pattern Recognition Letters, vol. 25, no. 4, pp. 481--494, 2004.
[5]
K.-H. Lee, and P.-L. Chiu, "Sharing visual secrets in single image random dot stereograms," IEEE Transactions on Image Processing, vol. 23, no. 10, pp. 4336--4347, 2014.
[6]
T. Back, Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms: Oxford University Press, 1996.

Cited By

View all
  • (2022)Analysis of Various Visual Cryptographic Techniques and their Issues Based on Optimization AlgorithmsInternational Journal of Image and Graphics10.1142/S021946782350059623:06Online publication date: 3-Sep-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
GECCO '18: Proceedings of the Genetic and Evolutionary Computation Conference Companion
July 2018
1968 pages
ISBN:9781450357647
DOI:10.1145/3205651
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 July 2018

Check for updates

Author Tags

  1. adaptive tagged visual cryptography
  2. genetic algorithm
  3. optimization
  4. tagged visual cryptography
  5. visual cryptography

Qualifiers

  • Abstract

Conference

GECCO '18
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,669 of 4,410 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 21 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Analysis of Various Visual Cryptographic Techniques and their Issues Based on Optimization AlgorithmsInternational Journal of Image and Graphics10.1142/S021946782350059623:06Online publication date: 3-Sep-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media