Abstract
The XOR operation has improved the recovery effect of the visual secret sharing schemes. Various visual secret sharing schemes based on XOR operation are available in the literature with some limitations, e.g. direct non-applicability of the scheme to the gray-scale images and reduced quality of the reconstructed secret image. Many existing visual secret sharing schemes in the literature, firstly converts grayscale secret image into a halftone image then creates the shares. This paper proposes XOR-based (n,n) − V CSXOR visual secret sharing scheme using pixel vectorization. It diffuses and disguise secret information into multiple meaningless shares prior to allocating participants of the group having no clue about the secret information. The scheme also resolves various problems like pixel expansion, contrast-loss, explicit codebook requirement, limitation on number of participants and lossy recovery of the secret image. The proposed scheme makes use of implicit codebook and pixel vectorization to encode gray secret image directly without converting to halftone image, into multiple random looking shares. Also applicable to binary image. Reveal a secret image perfectly by XOR-ing all share. The efficacy of the proposed scheme is verified by numerical illustrations, experimental results and comparative analysis. We found that proposed scheme outperform in comparison to the state-of-the-art approaches.
Similar content being viewed by others
References
Blundo C, De Bonis A, De Santis A (2001) Improved schemes for visual cryptography. Designs Codes Crypto 24:255–278
Blundo C, D’Arco P, De Santis A, Stinson DR (2003) Contrast optimal threshold visual cryptography schemes. SIAM J Discret Math 16:224–261
Chao HC, Fan TY (2017) XOR-Based progressive visual secret sharing using generalized random grids. Displays 49:6–15
Chattopadhyay AK, Nag A, Singh JP, Singh AK (2020) A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimedia Tools Appl 1–30
Chen TH, Li KC (2012) Multi-image encryption by circular random grids. Inf Sci 189:255–265
Chen TH, Tsao KH (2011) Threshold visual secret sharing by random grids. J Sys Softw 84:1197–1208
Chen TH, Tsao KH (2011) User-friendly random-grid-based visual secret sharing. IEEE Trans Circ Sys Video Technol 21:1693–1703
Chen TH, Tsao KH, Lee YS (2012) Yet another multiple-image encryption by rotating random grids. Signal Process 92:2229–2237
Chen YC, Horng G, Tsai DS (2012) Comment on “cheating prevention in visual cryptography” IEEE Trans Image Process 21:3319–3323
Chen YC, Tsai DS, Horng G (2013) Visual secret sharing with cheating prevention revisited. Digit Sig Process 23:1496–1504
Cimato S, De Prisco R, De Santis (2005) Probabilistic visual cryptography schemes. Comput J 49:97–107
Deshmukh M, Nain N, Ahmed M (2018) Efficient and secure multi secret sharing schemes based on boolean XOR and arithmetic modulo. Multimedia Tools Appl 77:89–107
Fu Z, Cheng Y, Yu B (2019) Perfect recovery of XOR-based visual cryptography scheme. Multimedia Tools Appl 78:2367–2384
Guo T, Liu F, Wu C (2014) K out of k extended visual cryptography scheme by random grids. Signal Process 94:90–101
Hofmeister T, Krause M, Simon HU (2000) Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor Comput Sci 240:471–485
Hu CM, Tzeng WG (2006) Cheating prevention in visual cryptography. IEEE Trans Image Process 16:36–45
Jia X, Wang D, Chu Q, Chen Z (2019) An efficient XOR-based verifiable visual cryptographic scheme. Multimedia Tools Appl 78:8207–8223
Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12:377–379
Koga H, Ueda E (2006) Basic properties of the (t, n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels. Designs Codes Crypto 40:81–102
Lee YS, Chen TH (2012) Insight into collusion attacks in random-grid-based visual secret sharing. Signal Process 92:727–736
Lian C, Pang L, Liang J (2014) Generalized random grid-based visual secret sharing for general access structures. Comput J 58:2426–2442
Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Sys Softw 73:405–414
Lin CH, Chen TH, Wu YT, Tsao KH, Lin KS (2014) Multi-factor cheating prevention in visual secret sharing by hybrid codebooks. J Vis Commun Image Represent 25:1543–1557
Lin CH, Lee YS, Chen TH (2015) Friendly progressive random-grid-based visual secret sharing with adaptive contrast. J Vis Commun Image Represent 33:31–41
Lin SJ, Chung WH (2011) A probabilistic model of (t,n) visual cryptography scheme with dynamic group. IEEE Trans Inf Foren Sec 7:197–207
Liu F, Wu C (2014) Optimal XOR based (2, n)-visual cryptography schemes. In: International workshop on digital watermarking, pp 333–349
Liu F, Wu CK, Lin XJ (2009) The alignment problem of visual cryptography schemes. Designs Codes Crypto 50:215–227
Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the theory and application of of cryptographic techniques, pp 1–12
Ou D, Sun W, Wu X (2015) Non-expansible XOR-based visual cryptography scheme with meaningful shares. Signal Process 108:604–621
Pang L, Miao D, Lian C (2016) User-friendly random-grid-based visual secret sharing for general access structures, vol 9, pp 966–976
Praveen K, Sethumadhavan M (2018) Cheating immune visual cryptographic scheme with reduced pixel expansion. In: Progress in advanced computing and intelligent engineering, pp 257–265
Salehi S, Balafar MA (2014) Visual multi secret sharing by cylindrical random grid. J Inf Sec Appl 19:245–255
Shyu SJ (2009) Image encryption by multiple random grids. Patt Recogn 42:1582–1596
Singh N (2018) XOR Encryption techniques of video steganography: a comparative analysis. In: International conference on intelligent systems design and applications, pp 203–214
Singh P, Raman B, Misra M (2018) A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Process 142:301–319
Tan L, Lu Y, Yan X, Liu L, Zhou X (2020) XOR-Ed visual secret sharing scheme with robust and meaningful shadows based on QR codes. Multimedia Tools Appl 79:5719–5741
Thien CC, Lin JC (2003) An image-sharing method with user-friendly shadow images. IEEE Trans Circ Sys Video Technol 13:1161–1169
Tsai DS, Chen TH, Horng G (2007) A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Patt Recogn 40:2356–2366
Tuyls P et al (2002) A polarisation based visual crypto system and its secret sharing schemes. https://eprint.iacr.org/2002/194
Tuyls P et al (2005) XOR-Based visual cryptography schemes. Designs Codes Crypto 37:169–186
Wu X, Liu T, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing via error diffusion. J Vis Commun Image Represent 24:552–566
Wu X, Ou D, Dai L, Sun W (2013) XOR-Based meaningful visual secret sharing by generalized random grids. In: Proceedings of the first ACM workshop on information hiding and multimedia security, pp 181–190
Wu X, Ou D, Liang Q, Sun W (2012) A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J Syst Softw 85:1852–1863
Wu X, Sun W (2012) Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J Sys Softw 85:1119–1134
Wu X, Sun W (2013) Generalized random grid and its applications in visual cryptography. IEEE Trans Inf Foren Sec 8:1541–1553
Wu X, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93:977–995
Wu X, Sun W (2013) Random grid-based visual secret sharing with abilities of OR and XOR decryptions. J Vis Commun Image Represent 24:48–62
Wu X, Sun W (2014) Improved tagged visual cryptography by random grids. Signal Process 97:64–82
Yan X, Wang S, El-Latif AAA, Niu X (2015) Random grids-based visual secret sharing with improved visual quality via error diffusion. Multimedia Tools Appl 74:9279–9296
Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Sys Softw 80:1070–1076
Zhou Z, Arce GR, Di Crescenzo G (2006) Halftone visual cryptography. IEEE Trans Image Process 15:2441–2453
Acknowledgments
This work was supported by University Grant Commission, India (RGNF award No : F1-17.1/2014-15/RGNF-2014-15-SC-UTT-87345/(SA-III/Website)) and University of Lucknow, Lucknow.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kannojia, S.P., Kumar, J. XOR-based visual secret sharing scheme using pixel vectorization. Multimed Tools Appl 80, 14609–14635 (2021). https://doi.org/10.1007/s11042-020-10352-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-10352-3