Skip to main content
Log in

Hierarchical visual cryptography for multisecret images based on a modified phase retrieval algorithm

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Visual cryptography is generally based on the base matrix scheme or the random grid scheme. These schemes may cause some problems, such as the expansion of the shares and the recovered images and the distortion of the recovered images. In this paper, we propose a modified phase retrieval algorithm and present a hierarchical visual cryptography scheme (HVCS). The scheme overcomes the problems that are mentioned and can share multiple secret images. Considering the differences in the social division of labor, there is a hierarchy between the shared images in the proposed scheme, that is, the participants have different rights. Further, to make the proposed scheme more applicable to practical needs, we propose a generalized HVCS by modifying the phase retrieval algorithm again so that each level can have more than one participant. The effectiveness and feasibility of the proposed scheme are verified by theoretical analysis and numerical simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Chavan PV, Atique M (2012) Design of hierarchical visual cryptography. Nirma University International Conference on Engineering (NUiCONE). IEEE: 1–3

  2. Chen J, Chen TS, Hsu HC et al (2009) Using multi-ringed shadow image of visual cryptography to hide more secret messages. Imaging Sci J 57(2):101–108

    Article  Google Scholar 

  3. Chen W, Chen X, Stern A et al (2013) Phase-modulated optical system with sparse representation for information encoding and authentication. IEEE Photonics Journal 5(2):6900113

    Article  Google Scholar 

  4. Feng JB, Wu HC, Tsai CS et al (2008) Visual secret sharing for multiple secrets. Pattern Recogn 41(12):3572–3581

    Article  Google Scholar 

  5. Gerchberg RW, Saxton WO (1972) A practical algorithm for the determination of phase from image and diffraction plane pictures. Optik 35:237–246

    Google Scholar 

  6. Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377–379

    Article  Google Scholar 

  7. Lee JS, Chang CC, Huynh NT et al (2015) Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique. Digit Signal Process 40:131–139

    Article  MathSciNet  Google Scholar 

  8. Meng XF, Cai LZ, Yang XL, Shen XX, Dong GY (2006) Information security system by iterative multiple-phase retrieval and pixel random permutation. Appl Opt 45(14):3289–3297

    Article  Google Scholar 

  9. Naor M, Shamir A (1994) Visual cryptography. Workshop on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp 1–12

    Google Scholar 

  10. Patel T, Srivastava R (2016) Hierarchical visual cryptography for grayscale image. Online International Conference on Green Engineering and Technologies (IC-GET). IEEE: 1–4

  11. Pirbhulal S, Wu W, Li G (2018) A biometric security model for wearable healthcare. IEEE International Conference on Data Mining Workshops (ICDMW). IEEE: 136–143

  12. Pirbhulal S, Samuel OW, Wu W et al (2019) A joint resource-aware and medical data security framework for wearable healthcare systems. Futur Gener Comput Syst 95:382–391

    Article  Google Scholar 

  13. Shyu SJ, Huang SY, Lee YK et al (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40(12):3633–3651

    Article  Google Scholar 

  14. Talat R, Muzammal M, Gohar M, et al. (2019) A decentralised disaster detection approach using image data. IEEE 89th Vehicular Technology Conference (VTC2019-Spring). IEEE: 1–5

  15. Wu HC, Chang CC (2005) Sharing visual multi-secrets using circle shares. Comput Standards Interfaces 28(1):123–135

    Article  Google Scholar 

  16. Wu CC, Chen LH (1998) A study on visual cryptography. Master's thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, ROC.

  17. Wu W, Pirbhulal S, Li G (2018) Adaptive computing-based biometric security for intelligent medical applications. Neural Comput & Applic: 1–10

  18. Yang CN, Chung TH (2010) A general multi-secret visual cryptography scheme. Opt Commun 283(24):4949–4962

    Article  Google Scholar 

  19. Yang CN, Chung TH (2013) Cryptanalysis of Chen et al.’s multi-secret visual cryptography scheme. Imaging Sci J 61(3):334–340

    Article  Google Scholar 

  20. Yu B, Shen G (2014) Multi-secret visual cryptography with deterministic contrast. Multimed Tools Appl 72(2):1867–1886

    Article  MathSciNet  Google Scholar 

  21. Zhao T, Chi Y (2018) A novel secret sharing with two users based on joint transform correlator and compressive sensing[J]. J Mod Opt 65(9):1072–1080

    Article  Google Scholar 

  22. Zhao T, Ran Q, Yuan L et al (2016) Optical image encryption using password key based on phase retrieval algorithm. J Mod Opt 63(8):771–776

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the reviewers for their valuable comments. This study was supported by the National Natural Science Foundation of China (No. 61702088); the Central University Basic Research Service Fees, China (No. N172303014); and the School PhD Fund, Northeastern University, Qinhuangdao, China (XNB201708).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tieyu Zhao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, T., Chi, Y. Hierarchical visual cryptography for multisecret images based on a modified phase retrieval algorithm. Multimed Tools Appl 79, 12165–12181 (2020). https://doi.org/10.1007/s11042-020-08632-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08632-z

Keywords

Navigation