Skip to main content

An Extended Visual Cryptography Scheme for Continuous-Tone Images

  • Conference paper
Digital Forensics and Watermarking (IWDW 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7128))

Included in the following conference series:

Abstract

Visual cryptography is a kind of cryptography that can be decoded directly by the human visual system when transparencies are stacked. Extended visual cryptography allows to print meaningful images on transparencies which can conceal the existence of “secret” in the transparencies. A lot of studies have tried to incorporate continous-tone images into extended visual cryptography. However, most of them suffer from deterioration of the resulting images. This paper proposes a new scheme for extended visual cryptography for continuous-tone images. It mainly consists of two techniques, namely parallel error diffusion and optimum tone mapping and can quickly encrypted images with no pixel expansion and high contrast. Some experimental results are shown to examine its effectiveness as well as limitation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Visual cryptography for general access structure. Information and Computation 129, 86–106 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  2. Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.: Extended capabilities for visual cryptography. Theoretical Computer Science 250, 143–161 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  3. Floyd, R., Steinberg, L.: An adaptive algorithm for spatial grayscale. Society for Information Display 17, 75–77 (1976)

    Google Scholar 

  4. Fu, M., Au, O.: A novel method to embed watermark in different halftone images: data hiding by conjugate error diffusion (dhced). In: Intl Conference on Acoustics, Speech, and Signal Processing, vol. III, pp. 529–532 (2003)

    Google Scholar 

  5. Jarvis, J., Judice, C., Ninke, W.: A survey of techniques for the display of continuous tone pictures on bilevel displays. Computer Graphics and Image Processing 5(1), 13–40 (1976)

    Article  Google Scholar 

  6. Kang, H.: Digital Color Halftoning. SPIE Optical Engineering Press, IEEE Press (1999)

    Google Scholar 

  7. Myodo, E., Takagi, K., Miyaji, S., Takishima, Y.: Halftone visual cryptography embedding a natural grayscale image based on error diffusion technique. In: Intl Conference on Multimedia and Expo., pp. 2114–2117 (2007)

    Google Scholar 

  8. Myodo, E., Takagi, K., Yoneyama, A.: Deterministic tone mapping to gamut area of halftone visual cryptography. IEICE Trans. on Fundamentals J93-A(12), 805–820 (2010)

    Google Scholar 

  9. Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. Journal of WSCG 10(2), 303–310 (2002)

    Google Scholar 

  10. Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  11. Ulichney, R.: Digital Halftoning. The MIT Press (1987)

    Google Scholar 

  12. Wang, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography via error diffusion. IEEE Trans. on Information Forensics and Security 4(3), 383–396 (2009)

    Article  Google Scholar 

  13. Wu, C., Thompson, G., Stanich, M.: Digital watermarking and steganography via overlays of halftone images. Electrical Engineering IBM Research Report RC23267 (W0407-013), IBM (2004)

    Google Scholar 

  14. Yang, C.N., Chen, T.S.: Extended visual secret sharing schemes: improving the shadow image quality. International Journal of Pattern Recognition and Artificial Intelligence 21, 879–898 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yamaguchi, Y. (2012). An Extended Visual Cryptography Scheme for Continuous-Tone Images. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32205-1_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32204-4

  • Online ISBN: 978-3-642-32205-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics