Abstract
More and more visual cryptography (VC) schemes have been engaged by introducing computational operations, such as XOR, in the secret decoding phase. To our best knowledge, Singh et al.’s scheme is the very first attempt to present an XOR-based VC scheme with the goals of both unique meaningful shares and perfect secret reconstruction. Thus, it’s worthwhile to further examine and enhance the security of Singh et al.’s scheme. This paper highlights shortcomings in Singh et al.’s XOR-based VC scheme, including the risk of revealing the secret via a single share and the absence of an (n,n) case. The paper also presents security enhancements. In addition, the related experiments are conducted to ensure the validity of the algorithms in Singh et al.’s scheme.
Similar content being viewed by others
References
Chen T-H, Tsao K-H (2011) User-friendly random-grid-based visual secret sharing. IEEE Trans Circ Syst Video Technol 21(11):1693–1703
Naor M, Shamir A (1994) Visual cryptography. Proc Workshop Theory Appli Cryptograp Tech:1–12
Chen T-H, Wu X-W (2020) Multiple secret image sharing with general access structure. Multimed Tools Appl 79(19):13247–13265
Lin C-S, Chen C-C, Chen Y-C (2021) XOR-Based Progressively Secret Image Sharing. Mathematics 9(6):612
Paul A, Kandar S, Dhara BC (2022) Boolean operation based lossless threshold secret image sharing. Multimed Tools Appl:1–24
Shyu SJ (2017) XOR-based visual cryptographic schemes with monotonously increasing and flawless reconstruction properties. IEEE Trans Circ Syst Video Technol 28(9):2397–2401
Singh P, Raman B, Misra M (2018) A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Process 142:301–319
Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recogn 38(5):767–772
Tsai C-S, Chang C-C, Chen T-S (2002) Sharing multiple secrets in digital images. J Syst Softw 64(2):163–170
Chang C-C, Chuang J-C (2002) An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recogn Lett 23(8):931–941
Jin D, Yan W-Q, Kankanhalli MS (2005) Progressive color visual cryptography. Jf Electron Imag 14(3):033019–033019-13
Zhao Y, Fu F-W (2022) A contrast improved OR and XOR based (k, n) visual cryptography scheme without pixel expansion. J Vis Commun Image Represent 82:103408
Li P, Yin L, Ma J, Wang H (2022) XOR-based visual cryptography scheme with essential shadows. J Vis Commun Image Represent 85:103513
Ma X, Song B, Lin W, Wu J, Huang W, Liu B (2022) High-fidelity decryption technology of Visual Cryptography based on optical coherence operation. Results Phys 43:106065
Singh B, Raman NA, Atrey PK (2017) Secure cloud-based image tampering detection and localization using POB number system. ACM Trans Multimed Comput, Commun, Appli (TOMM) 13(3):1–23
Chen T-H, Chang T-C, Zhu T-L (2021) Security-enhanced cloud-based image secret sharing and authentication using POB number system. Multimed Tools Appl 80:1901–1924
Acknowledgements
This work was supported in part by the Ministry of Science and Technology of Taiwan under Grant MOST 110-2221-E-415-006-MY2, and in part by the National Science and Technology Council of Taiwan under Grant NSTC 112-2221-E-415-005.
Funding
The authors have no relevant financial or non-financial interests to disclose.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Wu, XW., Chen, TH. Security enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful shares. Multimed Tools Appl 83, 28913–28926 (2024). https://doi.org/10.1007/s11042-023-16657-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16657-3