Skip to main content

Extended Visual Cryptography Scheme for Multi-secret Sharing

  • Conference paper
  • First Online:
Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 44))

Abstract

This paper proposes a novel user-friendly visual cryptography scheme for multiple secret sharing. We have generated meaningful shares for multiple secret images using cover images. These meaningful shares are shared among participants. All the shares are required to recover secret images that are shared. The proposed scheme uses Boolean-based operations for generating meaningful shares and recovering all secret images that are used. The proposed scheme achieved lossless recovery of multiple secrets and overcomes the problem of management of meaningless shares.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Blakely, G.R.: Safeguarding cryptography keys. Proc. Nat. Comput. Conf. 48, 313–317 (1979)

    Google Scholar 

  2. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  3. Cimato, S., Yang, C.-N.: Visual cryptography and secret image sharing. In: Digital Imaging and Computer Vision Series (2012)

    Google Scholar 

  4. Naor, M., Shamir, A.: Visual cryptography, In: Proceedings of Advances in Cryptology, pp. 1–12 (1995)

    Google Scholar 

  5. Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12, 377–379 (1987)

    Article  Google Scholar 

  6. Shyu, S.: Image encryption by random grids. Pattern Recogn. 40, 1014–1031 (2007)

    Article  MATH  Google Scholar 

  7. Wu, C.C., Chen, L.H.: A study on visual cryptography. Master Thesis, Institute of Computer and Information Sciences, National Chaio Tung University, Taiwan (1998)

    Google Scholar 

  8. Wu, H.C., Chang, C.C.: Sharing visual multi-secret using circle shares. Comput. Stan. Interfaces 28, 123–135 (2005)

    Article  Google Scholar 

  9. Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z.: Sharing multiple secrets in visual cryptography. Pattern Recogn. 40(12), 3633–3651 (2007)

    Article  MATH  Google Scholar 

  10. Feng, J.B., Wu, H.C., Tsai, C.S., Chang, Y.F., Chu, Y.P.: Visual secret sharing for multiple secrets. Pattern Recogn. 41, 3572–3581 (2008)

    Article  MATH  Google Scholar 

  11. Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z.Chen: Sharing multiple secrets in visual cryptography. Pattern Recogn. 40, 3633–3651 (2007)

    Article  MATH  Google Scholar 

  12. Chang, C.-C., Tu, N.T., Le, H.D.: Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation. Sig. Process. 99, 159–170 (2014)

    Article  Google Scholar 

  13. Wu, H.C., Chang, C.C.: Sharing visual multi-secrets using circle shares. Comput. Stand. Interfaces 28, 123–135 (2005)

    Article  Google Scholar 

  14. Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250, 143–161 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  15. Fang, W.P.: Friendly progressive visual secret sharing. Pattern Recogn. 41, 1410–1414 (2008)

    Article  MATH  Google Scholar 

  16. Chen, T.H., Lee, Y.S.: Yet another friendly progressive visual secret sharing scheme. In: Proceedings of 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 353–356 (2009)

    Google Scholar 

  17. Wang, D., Yi, F., Li, X.: On general construction for extended visual cryptography schemes. Pattern Recogn. 42, 3071–3082 (2009)

    Article  MATH  Google Scholar 

  18. Chen, T.H., Wu, C.S.: Efficient multi secret image sharing based on Boolean operations. J. Syst. Softw. 92, 107–114 (2014)

    Article  Google Scholar 

  19. Chen, T.H., Wu, C.S.: Efficient multi-secret image sharing based on Boolean operations. Sig. Process. 91, 90–97 (2011)

    Article  MATH  Google Scholar 

  20. Shyu, S.J., Chen, K.: Visual multiple secret sharing based upon turning and flipping. Inf. Sci. 181, 3246–3266 (2011)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to L. Siva Reddy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Siva Reddy, L., Prasad, M.V.N.K. (2016). Extended Visual Cryptography Scheme for Multi-secret Sharing. In: Nagar, A., Mohapatra, D., Chaki, N. (eds) Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. Smart Innovation, Systems and Technologies, vol 44. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2529-4_26

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2529-4_26

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2528-7

  • Online ISBN: 978-81-322-2529-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics