Visual cryptography is generally based on the base matrix scheme or the random grid scheme. These schemes may cause some problems, such as the expansion of the shares and the recovered images and the distortion of the recovered images. In this paper, we propose a modified phase retrieval algorithm and present a hierarchical visual cryptography scheme (HVCS). The scheme overcomes the problems that are mentioned and can share multiple secret images. Considering the differences in the social division of labor, there is a hierarchy between the shared images in the proposed scheme, that is, the participants have different rights. Further, to make the proposed scheme more applicable to practical needs, we propose a generalized HVCS by modifying the phase retrieval algorithm again so that each level can have more than one participant. The effectiveness and feasibility of the proposed scheme are verified by theoretical analysis and numerical simulation.
This is a preview of subscription content, log in to check access.
Buy single article
Instant unlimited access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Chavan PV, Atique M (2012) Design of hierarchical visual cryptography. Nirma University International Conference on Engineering (NUiCONE). IEEE: 1–3
Chen J, Chen TS, Hsu HC et al (2009) Using multi-ringed shadow image of visual cryptography to hide more secret messages. Imaging Sci J 57(2):101–108
Chen W, Chen X, Stern A et al (2013) Phase-modulated optical system with sparse representation for information encoding and authentication. IEEE Photonics Journal 5(2):6900113
Feng JB, Wu HC, Tsai CS et al (2008) Visual secret sharing for multiple secrets. Pattern Recogn 41(12):3572–3581
Gerchberg RW, Saxton WO (1972) A practical algorithm for the determination of phase from image and diffraction plane pictures. Optik 35:237–246
Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377–379
Lee JS, Chang CC, Huynh NT et al (2015) Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique. Digit Signal Process 40:131–139
Meng XF, Cai LZ, Yang XL, Shen XX, Dong GY (2006) Information security system by iterative multiple-phase retrieval and pixel random permutation. Appl Opt 45(14):3289–3297
Naor M, Shamir A (1994) Visual cryptography. Workshop on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp 1–12
Patel T, Srivastava R (2016) Hierarchical visual cryptography for grayscale image. Online International Conference on Green Engineering and Technologies (IC-GET). IEEE: 1–4
Pirbhulal S, Wu W, Li G (2018) A biometric security model for wearable healthcare. IEEE International Conference on Data Mining Workshops (ICDMW). IEEE: 136–143
Pirbhulal S, Samuel OW, Wu W et al (2019) A joint resource-aware and medical data security framework for wearable healthcare systems. Futur Gener Comput Syst 95:382–391
Shyu SJ, Huang SY, Lee YK et al (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40(12):3633–3651
Talat R, Muzammal M, Gohar M, et al. (2019) A decentralised disaster detection approach using image data. IEEE 89th Vehicular Technology Conference (VTC2019-Spring). IEEE: 1–5
Wu HC, Chang CC (2005) Sharing visual multi-secrets using circle shares. Comput Standards Interfaces 28(1):123–135
Wu CC, Chen LH (1998) A study on visual cryptography. Master's thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, ROC.
Wu W, Pirbhulal S, Li G (2018) Adaptive computing-based biometric security for intelligent medical applications. Neural Comput & Applic: 1–10
Yang CN, Chung TH (2010) A general multi-secret visual cryptography scheme. Opt Commun 283(24):4949–4962
Yang CN, Chung TH (2013) Cryptanalysis of Chen et al.’s multi-secret visual cryptography scheme. Imaging Sci J 61(3):334–340
Yu B, Shen G (2014) Multi-secret visual cryptography with deterministic contrast. Multimed Tools Appl 72(2):1867–1886
Zhao T, Chi Y (2018) A novel secret sharing with two users based on joint transform correlator and compressive sensing[J]. J Mod Opt 65(9):1072–1080
Zhao T, Ran Q, Yuan L et al (2016) Optical image encryption using password key based on phase retrieval algorithm. J Mod Opt 63(8):771–776
The authors would like to thank the reviewers for their valuable comments. This study was supported by the National Natural Science Foundation of China (No. 61702088); the Central University Basic Research Service Fees, China (No. N172303014); and the School PhD Fund, Northeastern University, Qinhuangdao, China (XNB201708).
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Zhao, T., Chi, Y. Hierarchical visual cryptography for multisecret images based on a modified phase retrieval algorithm. Multimed Tools Appl (2020). https://doi.org/10.1007/s11042-020-08632-z
- Secret sharing
- Visual cryptography
- Multiple secrets sharing
- Phase retrieval algorithm