Skip to main content

Plane-Wise Encryption Based Progressive Visual Cryptography for Gray Image

  • Conference paper
  • First Online:
Communication, Networks and Computing (CNC 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 839))

Included in the following conference series:

  • 973 Accesses

Abstract

Visual secret sharing is a powerful technique, which allows to diffuse and disguise a secret image into two or more shares. To reconstruct the secret image these shares are stacked and viewed by the human visual system. Unluckily, Visual cryptography is not in primary use because of the degradation process entails severe problems in reconstructed image quality. Degradation reflects in terms of pixel expansion and loss in contrast, which makes visual cryptography unsuitable to handle visual information (image, video etc.) for the purpose of sharing and protection. The visual secret sharing techniques performed computation in order to absolve reconstructed secret image from pixel expansion and loss in contrast. Progressive visual cryptography (PVC) inherits all the advantageous features of traditional visual cryptography except the decryption process. In PVC, contrast of the reconstructed secret image increases gradually as the number of stacked shares increase but quality of reconstructed secret images still an issue for the researchers. To resolve the issue, this paper proposes a plane-wise encryption based progressive visual cryptography scheme for gray image. The effectiveness of the proposed scheme are carried out by experimental results and compared with state of the art approaches. Experimental results show that proposed scheme is well suited for applications where quality of secret image is a major issue.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053419

    Chapter  Google Scholar 

  2. Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Des. Codes Cryptogr. 50(2), 215–227 (2009)

    Article  MathSciNet  Google Scholar 

  3. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)

    Article  MathSciNet  Google Scholar 

  4. Yan, X., et al.: New approaches for efficient information hiding-based secret image sharing schemes. SIViP 9(3), 499–510 (2015)

    Article  Google Scholar 

  5. Chen, T.-H., Tsai, D.-S.: Owner? Customer right protection mechanism using a watermarking scheme and a watermarking protocol. Pattern Recognit. 39(8), 1530–1541 (2006)

    Article  Google Scholar 

  6. Chang, C.-C., Wu, H.C.: A copyright protection scheme of images based on visual cryptography. Imaging Sci. J. 49(3), 141–150 (2001)

    Article  MathSciNet  Google Scholar 

  7. Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0052245

    Chapter  Google Scholar 

  8. Yan, W.-Q., Jin, D., Kankanhalli, M.S.: Visual cryptography for print and scan applications. In: Proceedings of the 2004 International Symposium on Circuits and Systems, ISCAS 2004, vol. 5. IEEE (2004)

    Google Scholar 

  9. Tuyls, P., Kevenaar, T., Schrijen, G.-J., Staring, T., van Dijk, M.: Visual crypto displays enabling secure communications. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 271–284. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-39881-3_23

    Chapter  Google Scholar 

  10. Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)

    Article  Google Scholar 

  11. Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383–396 (2009)

    Article  Google Scholar 

  12. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1), 143–161 (2001)

    Article  MathSciNet  Google Scholar 

  13. Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 82(10), 2172–2177 (1999)

    Google Scholar 

  14. Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4), 481–494 (2004)

    Article  MathSciNet  Google Scholar 

  15. Yang, C.N., Chen, T.S.: Size-adjustable visual secret sharing schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88(9), 2471–2474 (2005)

    Article  Google Scholar 

  16. Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2005)

    Article  Google Scholar 

  17. Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377–379 (1987)

    Article  Google Scholar 

  18. Shyu, S.J.: Image encryption by random grids. Pattern Recognit. 40(3), 1014–1031 (2007)

    Article  Google Scholar 

  19. Shyu, S.J.: Image encryption by multiple random grids. Pattern Recognit. 42(7), 1582–1596 (2009)

    Article  Google Scholar 

  20. Fang, W.P., Lin, J.C.: Progressive viewing and sharing of sensitive images. Pattern Recognit. Image Anal. 16(4), 632–636 (2006)

    Article  Google Scholar 

  21. Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. J. Electron. Imaging 14(3), 033019 (2005)

    Article  Google Scholar 

  22. Hou, Y.C., Quan, Z.Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. Circuits Syst. Video Technol. 21(11), 1760–1764 (2011)

    Article  Google Scholar 

  23. Fang, W.P.: Friendly progressive visual secret sharing. Pattern Recognit. 41(4), 1410–1414 (2008)

    Article  Google Scholar 

  24. Lin, C.H., Lee, Y.S., Chen, T.H.: Friendly progressive random-grid-based visual secret sharing with adaptive contrast. J. Vis. Commun. Image Represent. 33, 31–41 (2015)

    Article  Google Scholar 

  25. Shivani, S., Agarwal, S.: Progressive visual cryptography with unexpanded meaningful shares. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 12(4), 50 (2016)

    Google Scholar 

  26. Shivani, S., Agarwal, S.: VPVC: verifiable progressive visual cryptography. Pattern Anal. Appl. 21(1), 1–28 (2016)

    MathSciNet  Google Scholar 

Download references

Acknowledgment

Author thanks to Prof. Kirti Sinha, Head, Department of Computer Science, University of Lucknow, Lucknow, for providing infrastructure facilities. Second author thankful to University Grant Commission, India for providing RGNSRF to sustain his research (RGNF award No: F1-17.1/201415/RGNF-2014-15-SC-UTT-87345/(SA-III/Website)).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Suresh Prasad Kannojia or Jasvant Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kannojia, S.P., Kumar, J. (2019). Plane-Wise Encryption Based Progressive Visual Cryptography for Gray Image. In: Verma, S., Tomar, R., Chaurasia, B., Singh, V., Abawajy, J. (eds) Communication, Networks and Computing. CNC 2018. Communications in Computer and Information Science, vol 839. Springer, Singapore. https://doi.org/10.1007/978-981-13-2372-0_33

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2372-0_33

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2371-3

  • Online ISBN: 978-981-13-2372-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics