Abstract
This paper proposes a novel user-friendly visual cryptography scheme for multiple secret sharing. We have generated meaningful shares for multiple secret images using cover images. These meaningful shares are shared among participants. All the shares are required to recover secret images that are shared. The proposed scheme uses Boolean-based operations for generating meaningful shares and recovering all secret images that are used. The proposed scheme achieved lossless recovery of multiple secrets and overcomes the problem of management of meaningless shares.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Blakely, G.R.: Safeguarding cryptography keys. Proc. Nat. Comput. Conf. 48, 313–317 (1979)
Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
Cimato, S., Yang, C.-N.: Visual cryptography and secret image sharing. In: Digital Imaging and Computer Vision Series (2012)
Naor, M., Shamir, A.: Visual cryptography, In: Proceedings of Advances in Cryptology, pp. 1–12 (1995)
Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12, 377–379 (1987)
Shyu, S.: Image encryption by random grids. Pattern Recogn. 40, 1014–1031 (2007)
Wu, C.C., Chen, L.H.: A study on visual cryptography. Master Thesis, Institute of Computer and Information Sciences, National Chaio Tung University, Taiwan (1998)
Wu, H.C., Chang, C.C.: Sharing visual multi-secret using circle shares. Comput. Stan. Interfaces 28, 123–135 (2005)
Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z.: Sharing multiple secrets in visual cryptography. Pattern Recogn. 40(12), 3633–3651 (2007)
Feng, J.B., Wu, H.C., Tsai, C.S., Chang, Y.F., Chu, Y.P.: Visual secret sharing for multiple secrets. Pattern Recogn. 41, 3572–3581 (2008)
Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z.Chen: Sharing multiple secrets in visual cryptography. Pattern Recogn. 40, 3633–3651 (2007)
Chang, C.-C., Tu, N.T., Le, H.D.: Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation. Sig. Process. 99, 159–170 (2014)
Wu, H.C., Chang, C.C.: Sharing visual multi-secrets using circle shares. Comput. Stand. Interfaces 28, 123–135 (2005)
Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250, 143–161 (2001)
Fang, W.P.: Friendly progressive visual secret sharing. Pattern Recogn. 41, 1410–1414 (2008)
Chen, T.H., Lee, Y.S.: Yet another friendly progressive visual secret sharing scheme. In: Proceedings of 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 353–356 (2009)
Wang, D., Yi, F., Li, X.: On general construction for extended visual cryptography schemes. Pattern Recogn. 42, 3071–3082 (2009)
Chen, T.H., Wu, C.S.: Efficient multi secret image sharing based on Boolean operations. J. Syst. Softw. 92, 107–114 (2014)
Chen, T.H., Wu, C.S.: Efficient multi-secret image sharing based on Boolean operations. Sig. Process. 91, 90–97 (2011)
Shyu, S.J., Chen, K.: Visual multiple secret sharing based upon turning and flipping. Inf. Sci. 181, 3246–3266 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Siva Reddy, L., Prasad, M.V.N.K. (2016). Extended Visual Cryptography Scheme for Multi-secret Sharing. In: Nagar, A., Mohapatra, D., Chaki, N. (eds) Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. Smart Innovation, Systems and Technologies, vol 44. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2529-4_26
Download citation
DOI: https://doi.org/10.1007/978-81-322-2529-4_26
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2528-7
Online ISBN: 978-81-322-2529-4
eBook Packages: EngineeringEngineering (R0)