Abstract
Visual secret sharing is a powerful technique, which allows to diffuse and disguise a secret image into two or more shares. To reconstruct the secret image these shares are stacked and viewed by the human visual system. Unluckily, Visual cryptography is not in primary use because of the degradation process entails severe problems in reconstructed image quality. Degradation reflects in terms of pixel expansion and loss in contrast, which makes visual cryptography unsuitable to handle visual information (image, video etc.) for the purpose of sharing and protection. The visual secret sharing techniques performed computation in order to absolve reconstructed secret image from pixel expansion and loss in contrast. Progressive visual cryptography (PVC) inherits all the advantageous features of traditional visual cryptography except the decryption process. In PVC, contrast of the reconstructed secret image increases gradually as the number of stacked shares increase but quality of reconstructed secret images still an issue for the researchers. To resolve the issue, this paper proposes a plane-wise encryption based progressive visual cryptography scheme for gray image. The effectiveness of the proposed scheme are carried out by experimental results and compared with state of the art approaches. Experimental results show that proposed scheme is well suited for applications where quality of secret image is a major issue.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053419
Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Des. Codes Cryptogr. 50(2), 215–227 (2009)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)
Yan, X., et al.: New approaches for efficient information hiding-based secret image sharing schemes. SIViP 9(3), 499–510 (2015)
Chen, T.-H., Tsai, D.-S.: Owner? Customer right protection mechanism using a watermarking scheme and a watermarking protocol. Pattern Recognit. 39(8), 1530–1541 (2006)
Chang, C.-C., Wu, H.C.: A copyright protection scheme of images based on visual cryptography. Imaging Sci. J. 49(3), 141–150 (2001)
Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0052245
Yan, W.-Q., Jin, D., Kankanhalli, M.S.: Visual cryptography for print and scan applications. In: Proceedings of the 2004 International Symposium on Circuits and Systems, ISCAS 2004, vol. 5. IEEE (2004)
Tuyls, P., Kevenaar, T., Schrijen, G.-J., Staring, T., van Dijk, M.: Visual crypto displays enabling secure communications. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 271–284. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-39881-3_23
Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)
Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383–396 (2009)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1), 143–161 (2001)
Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 82(10), 2172–2177 (1999)
Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4), 481–494 (2004)
Yang, C.N., Chen, T.S.: Size-adjustable visual secret sharing schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88(9), 2471–2474 (2005)
Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2005)
Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377–379 (1987)
Shyu, S.J.: Image encryption by random grids. Pattern Recognit. 40(3), 1014–1031 (2007)
Shyu, S.J.: Image encryption by multiple random grids. Pattern Recognit. 42(7), 1582–1596 (2009)
Fang, W.P., Lin, J.C.: Progressive viewing and sharing of sensitive images. Pattern Recognit. Image Anal. 16(4), 632–636 (2006)
Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. J. Electron. Imaging 14(3), 033019 (2005)
Hou, Y.C., Quan, Z.Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. Circuits Syst. Video Technol. 21(11), 1760–1764 (2011)
Fang, W.P.: Friendly progressive visual secret sharing. Pattern Recognit. 41(4), 1410–1414 (2008)
Lin, C.H., Lee, Y.S., Chen, T.H.: Friendly progressive random-grid-based visual secret sharing with adaptive contrast. J. Vis. Commun. Image Represent. 33, 31–41 (2015)
Shivani, S., Agarwal, S.: Progressive visual cryptography with unexpanded meaningful shares. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 12(4), 50 (2016)
Shivani, S., Agarwal, S.: VPVC: verifiable progressive visual cryptography. Pattern Anal. Appl. 21(1), 1–28 (2016)
Acknowledgment
Author thanks to Prof. Kirti Sinha, Head, Department of Computer Science, University of Lucknow, Lucknow, for providing infrastructure facilities. Second author thankful to University Grant Commission, India for providing RGNSRF to sustain his research (RGNF award No: F1-17.1/201415/RGNF-2014-15-SC-UTT-87345/(SA-III/Website)).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kannojia, S.P., Kumar, J. (2019). Plane-Wise Encryption Based Progressive Visual Cryptography for Gray Image. In: Verma, S., Tomar, R., Chaurasia, B., Singh, V., Abawajy, J. (eds) Communication, Networks and Computing. CNC 2018. Communications in Computer and Information Science, vol 839. Springer, Singapore. https://doi.org/10.1007/978-981-13-2372-0_33
Download citation
DOI: https://doi.org/10.1007/978-981-13-2372-0_33
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2371-3
Online ISBN: 978-981-13-2372-0
eBook Packages: Computer ScienceComputer Science (R0)