Advertisement

Hierarchical visual cryptography for multisecret images based on a modified phase retrieval algorithm

  • 14 Accesses

Abstract

Visual cryptography is generally based on the base matrix scheme or the random grid scheme. These schemes may cause some problems, such as the expansion of the shares and the recovered images and the distortion of the recovered images. In this paper, we propose a modified phase retrieval algorithm and present a hierarchical visual cryptography scheme (HVCS). The scheme overcomes the problems that are mentioned and can share multiple secret images. Considering the differences in the social division of labor, there is a hierarchy between the shared images in the proposed scheme, that is, the participants have different rights. Further, to make the proposed scheme more applicable to practical needs, we propose a generalized HVCS by modifying the phase retrieval algorithm again so that each level can have more than one participant. The effectiveness and feasibility of the proposed scheme are verified by theoretical analysis and numerical simulation.

This is a preview of subscription content, log in to check access.

Access options

Buy single article

Instant unlimited access to the full article PDF.

US$ 39.95

Price includes VAT for USA

Subscribe to journal

Immediate online access to all issues from 2019. Subscription will auto renew annually.

US$ 199

This is the net price. Taxes to be calculated in checkout.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

References

  1. 1.

    Chavan PV, Atique M (2012) Design of hierarchical visual cryptography. Nirma University International Conference on Engineering (NUiCONE). IEEE: 1–3

  2. 2.

    Chen J, Chen TS, Hsu HC et al (2009) Using multi-ringed shadow image of visual cryptography to hide more secret messages. Imaging Sci J 57(2):101–108

  3. 3.

    Chen W, Chen X, Stern A et al (2013) Phase-modulated optical system with sparse representation for information encoding and authentication. IEEE Photonics Journal 5(2):6900113

  4. 4.

    Feng JB, Wu HC, Tsai CS et al (2008) Visual secret sharing for multiple secrets. Pattern Recogn 41(12):3572–3581

  5. 5.

    Gerchberg RW, Saxton WO (1972) A practical algorithm for the determination of phase from image and diffraction plane pictures. Optik 35:237–246

  6. 6.

    Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377–379

  7. 7.

    Lee JS, Chang CC, Huynh NT et al (2015) Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique. Digit Signal Process 40:131–139

  8. 8.

    Meng XF, Cai LZ, Yang XL, Shen XX, Dong GY (2006) Information security system by iterative multiple-phase retrieval and pixel random permutation. Appl Opt 45(14):3289–3297

  9. 9.

    Naor M, Shamir A (1994) Visual cryptography. Workshop on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp 1–12

  10. 10.

    Patel T, Srivastava R (2016) Hierarchical visual cryptography for grayscale image. Online International Conference on Green Engineering and Technologies (IC-GET). IEEE: 1–4

  11. 11.

    Pirbhulal S, Wu W, Li G (2018) A biometric security model for wearable healthcare. IEEE International Conference on Data Mining Workshops (ICDMW). IEEE: 136–143

  12. 12.

    Pirbhulal S, Samuel OW, Wu W et al (2019) A joint resource-aware and medical data security framework for wearable healthcare systems. Futur Gener Comput Syst 95:382–391

  13. 13.

    Shyu SJ, Huang SY, Lee YK et al (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40(12):3633–3651

  14. 14.

    Talat R, Muzammal M, Gohar M, et al. (2019) A decentralised disaster detection approach using image data. IEEE 89th Vehicular Technology Conference (VTC2019-Spring). IEEE: 1–5

  15. 15.

    Wu HC, Chang CC (2005) Sharing visual multi-secrets using circle shares. Comput Standards Interfaces 28(1):123–135

  16. 16.

    Wu CC, Chen LH (1998) A study on visual cryptography. Master's thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, ROC.

  17. 17.

    Wu W, Pirbhulal S, Li G (2018) Adaptive computing-based biometric security for intelligent medical applications. Neural Comput & Applic: 1–10

  18. 18.

    Yang CN, Chung TH (2010) A general multi-secret visual cryptography scheme. Opt Commun 283(24):4949–4962

  19. 19.

    Yang CN, Chung TH (2013) Cryptanalysis of Chen et al.’s multi-secret visual cryptography scheme. Imaging Sci J 61(3):334–340

  20. 20.

    Yu B, Shen G (2014) Multi-secret visual cryptography with deterministic contrast. Multimed Tools Appl 72(2):1867–1886

  21. 21.

    Zhao T, Chi Y (2018) A novel secret sharing with two users based on joint transform correlator and compressive sensing[J]. J Mod Opt 65(9):1072–1080

  22. 22.

    Zhao T, Ran Q, Yuan L et al (2016) Optical image encryption using password key based on phase retrieval algorithm. J Mod Opt 63(8):771–776

Download references

Acknowledgements

The authors would like to thank the reviewers for their valuable comments. This study was supported by the National Natural Science Foundation of China (No. 61702088); the Central University Basic Research Service Fees, China (No. N172303014); and the School PhD Fund, Northeastern University, Qinhuangdao, China (XNB201708).

Author information

Correspondence to Tieyu Zhao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Zhao, T., Chi, Y. Hierarchical visual cryptography for multisecret images based on a modified phase retrieval algorithm. Multimed Tools Appl (2020). https://doi.org/10.1007/s11042-020-08632-z

Download citation

Keywords

  • Secret sharing
  • Visual cryptography
  • Multiple secrets sharing
  • Phase retrieval algorithm