skip to main content
research-article

Enhancement of Information Carrying and Decoding for Visual Cryptography with Error Correction

Published:18 September 2023Publication History
Skip Abstract Section

Abstract

Recently, three visual cryptography schemes with t-error-correcting capability (VCSs-tEC) were introduced for preventing the shadows carrying additional information from being corrupted by noise interference. However, the concerns on VCS-tEC, such as the average amount of carrying information, decoding of information from shadows, and the demonstration way of a secret, should be considered and improved. In this article, two schemes, namely the (k, n) probabilistic VCS-tEC (PVCS-tEC) and the (2, n) deterministic VCS-tEC (DVCS-tEC), are proposed. The concept of probabilistic VCS is combined with the Bose-Chaudhuri-Hocquenghem code (BCH code) for designing the (k, n) PVCS-tEC. Furthermore, some constant-weight BCH codewords are adopted to build the (2, n)-DVCS-tEC. Comprehensive results and experiments are demonstrated to clarify the enhancement of information-carrying and decoding by the two proposed methods.

REFERENCES

  1. [1] Bose Bella and Rao Thammavarapu RN. 1982. Theory of unidirectional error correcting/detecting codes. IEEE Transactions on Computers6 (1982), 521530.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Chen Bing, Lu Wei, Huang Jiwu, Weng Jian, and Zhou Yicong. 2022. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Transactions on Dependable and Secure Computing 19, 2 (2022), 978991.Google ScholarGoogle Scholar
  3. [3] Cimato S., Prisco R. De, and Santis A. De. 2006. Probabilistic visual cryptography schemes. Computer Journal 49, 1 (2006), 97107.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Eisen Philip A and Stinson Douglas R. 2002. Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. Designs, Codes and Cryptography 25, 1 (2002), 1561.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Hou Y. C.. 2003. Visual cryptography for color images. Pattern Recognition 36, 7 (2003), 16191629.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Jia Xingxing, Guo Yusheng, Luo Xiangyang, Wang Daoshun, and Zhang Chaoyang. 2022. A perfect secret sharing scheme for general access structures. Information Sciences 595 (2022), 5469.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Jia Xingxing, Wang Daoshun, Nie Daxin, and Zhang Chaoyang. 2018. Collaborative visual cryptography schemes. IEEE Transactions on Circuits and Systems for Video Technology 28, 5 (2018), 10561070.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Kasyap Harsh and Tripathy Somanath. 2021. Privacy-preserving decentralized learning framework for healthcare system. ACM Transactions on Multimedia Computing, Communications, and Applications 17, 2s (2021), 124.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Kundu Sandip and Reddy Sudhakar M.. 1990. On symmetric error correcting and all unidirectional error detecting codes. IEEE Transactions on Computers 39, 6 (1990), 752761.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Laih Chi-Sung and Yang Ching-Nung. 1996. On the analysis and design of group theoretical t-syEC/AUED codes. IEEE Transactions on Computers 45, 1 (1996), 103108.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Lathey Ankita and Atrey Pradeep K. 2015. Image enhancement in encrypted domain over cloud. ACM Transactions on Multimedia Computing, Communications, and Applications 11, 3 (2015), 124.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Li Peng, Liu Zuquan, and Yang Ching-Nung. 2018. A construction method of (t, k, n)-essential secret image sharing scheme. Signal Processing: Image Communication 65 (2018), 210220.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Li Peng, Ma Pei-Jun, Su Xiao-Hong, and Yang Ching-Nung. 2012. Improvements of a two-in-one image secret sharing scheme based on gray mixing model. Journal of Visual Communication and Image Representation 23, 3 (2012), 441453.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Lin Sian-Jheng and Lin Ja-Chen. 2007. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognition 40, 12 (2007), 36523666.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Liu Yanxiao and Yang Chingnung. 2017. Scalable secret image sharing scheme with essential shadows. Signal Processing: Image Communication 58 (2017), 4955.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Liu Zuquan, Zhu Guopu, Ding Feng, Luo Xiangyang, Kwong Sam, and Li Peng. 2022. Contrast-enhanced color visual cryptography for (k, n) threshold schemes. ACM Transactions on Multimedia Computing, Communications and Applications 18, 3s (2022), 116.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Liu Zuquan, Zhu Guopu, Wang Yuan-Gen, Yang Jianquan, and Kwong Sam. 2020. A novel (t, s, k, n)-threshold visual secret sharing scheme based on access structure partition. ACM Transactions on Multimedia Computing, Communications, and Applications 16, 4 (2020), 121.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Naor M. and Shamir A.. 1995. Visual cryptography. Lecture Notes in Computer Science 950, 1 (1995), 112.Google ScholarGoogle Scholar
  19. [19] Peterson Wesley. 1960. Encoding and error-correction procedures for the bose-chaudhuri codes. IRE Transactions on Information Theory 6, 4 (1960), 459470.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Puteaux Pauline, Yriarte Félix, and Puech William. 2023. A secret JPEG image sharing method over GF (\(2^M\)) galois fields. IEEE Transactions on Circuits and Systems for Video Technology 33, 6 (2023), 3030–3042.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Shamir A.. 1979. How to share a secret. Communications of the ACM 22, 11 (1979), 612613.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Shen Gang, Liu Feng, Fu Zhengxin, and Yu Bin. 2017. Perfect contrast XOR-based visual cryptography schemes via linear algebra. Designs, Codes and Cryptography 85, 1 (2017), 1537.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Shyu Shyong Jian and Chen Ming Chiang. 2015. Minimizing pixel expansion in visual cryptographic scheme for general access structures. IEEE Transactions on Circuits and Systems for Video Technology 25, 9 (2015), 15571561.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Thien Chih-Ching and Lin Ja-Chen. 2002. Secret image sharing. Computers & Graphics 26, 5 (2002), 765770.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Verheul Eric R and Tilborg Henk CA Van. 1997. Constructions and properties of k out of n visual secret sharing schemes. Designs, Codes and Cryptography 11, 2 (1997), 179196.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Weir Jonathan, Yan Wei-Qi, and Kankanhalli Mohan S. 2012. Image hatching for visual cryptography. ACM Transactions on Multimedia Computing, Communications, and Applications 8, 2S (2012), 32.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Wu Xiaotian and Yang Ching-Nung. 2019. A combination of color-black-and-white visual cryptography and polynomial based secret image sharing. Journal of Visual Communication and Image Representation 61 (2019), 7484.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Wu Xiaotian and Yao Peng. 2023. Boolean-based two-in-one secret image sharing by adaptive pixel grouping. ACM Transactions on Multimedia Computing, Communications and Applications 19, 1 (2023), 123.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Xia Zhihua, Gu Qi, Zhou Wenhao, Xiong Lizhi, Weng Jian, and Xiong Naixue. 2023. STR: Secure computation on additive shares using the share-transform-reveal strategy. IEEE Transactions on Computers (2023). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Xiong Lizhi, Han Xiao, Yang Ching-Nung, and Xia Zhihua. 2023. RDH-DES: Reversible data hiding over distributed encrypted-image servers based on secret sharing. ACM Transactions on Multimedia Computing, Communications and Applications 19, 1 (2023), 119.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Yan Xuehu, Liu Lintao, Li Longlong, and Lu Yuliang. 2021. Robust secret image sharing resistant to noise in shares. ACM Transactions on Multimedia Computing, Communications, and Applications 17, 1 (2021), 122.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Yan Xuehu and Lu Yuliang. 2017. Contrast-improved visual secret sharing based on random grid for general access structure. Digital Signal Processing 71 (2017), 3645.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Yan Xuehu, Lu Yuliang, Liu Lintao, and Song Xianhua. 2020. Reversible image secret sharing. IEEE Transactions on Information Forensics and Security 15 (2020), 38483858.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Yang C.N.. 2004. New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25, 4 (2004), 486494.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Yang Ching-Nung and Wang Dao-Shun. 2014. Property analysis of XOR-based visual cryptography. IEEE Transactions on Circuits and Systems for Video Technology 24, 2 (2014), 189197.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Yang Ching-Nung, Wu Chih-Cheng, and Wang Dao-Shun. 2014. A discussion on the relationship between probabilistic visual cryptography and random grid. Information Sciences 278 (2014), 141173.Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Yang Ching-Nung and Yang Yi-Yun. 2021. On the analysis and design of visual cryptography with error correcting capability. IEEE Transactions on Circuits and Systems for Video Technology 31, 6 (2021), 24652479.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Enhancement of Information Carrying and Decoding for Visual Cryptography with Error Correction

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Multimedia Computing, Communications, and Applications
        ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 20, Issue 1
        January 2024
        639 pages
        ISSN:1551-6857
        EISSN:1551-6865
        DOI:10.1145/3613542
        • Editor:
        • Abdulmotaleb El Saddik
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 September 2023
        • Online AM: 5 August 2023
        • Accepted: 28 July 2023
        • Revised: 30 April 2023
        • Received: 17 December 2022
        Published in tomm Volume 20, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)130
        • Downloads (Last 6 weeks)15

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text