New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size

  • Ching-Nung Yang
  • Tse-Shih Chen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3480)

Abstract

Visual Secret Sharing (VSS) scheme proposed by Naor and Shamir is a perfect secure scheme to share the secret image. By using m subpixels to represent one pixel, the secret image is divided into several shadow images whose size is m times than the secret image. The value of m is known as the pixel expansion. In this paper, we propose the new size-reduced VSS schemes and dramatically decrease the pixel expansion to a half and meantime the contrast is not compromised.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  2. 2.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. In: ECCC, Electronic Colloquium on Computational Complexity, TR96- 012 (1996)Google Scholar
  3. 3.
    Verheul, E.R., Van Tilborg, H.C.A.: Constructions and properties of k out of n visual secret sharing schemes. Designs, Codes and Cryptography 11(2), 179–196 (1997)MATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    Eisen, P.A., Stinson, D.R.: Threshold visual cryptography schemes with specified whiteness. Designs, Codes and Cryptography 25(1), 15–61 (2002)MATHCrossRefMathSciNetGoogle Scholar
  5. 5.
    Lukac, R., Plataniotis, K.N.: Colour image secret sharing. IEE Electronics Letters 40(9), 529–530 (2004)CrossRefGoogle Scholar
  6. 6.
    Lukac, R., Plataniotis, K.N.: Bit-level based secret sharing for iImage encryption. Pattern Recognition 38(5), 767–772 (2005)MATHCrossRefGoogle Scholar
  7. 7.
    Lukac, R., Plataniotis, K.N.: A color image secret sharing scheme satisfying the perfect reconstruction property. In: Proceedings of MMS 2004, Italy, September 29 - October 1, pp. 351–354 (2004)Google Scholar
  8. 8.
    Kuwakado, H., Tanaka, H.: Size-Reduced Visual Secret Sharing Scheme. IEICE trans. Fundamentals E87-A(5), 1193–1197 (2004)Google Scholar
  9. 9.
    Ulichney, R.: Digital Halftoning. MIT Press, Cambridge (1987)Google Scholar
  10. 10.
    Zhang, Y.: Space-filling curve ordered dither. Computers and Graphics 22(4), 559–563 (1998)CrossRefGoogle Scholar
  11. 11.
    Lin, C.C., Tsai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters 24, 349–358 (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Ching-Nung Yang
    • 1
  • Tse-Shih Chen
    • 1
  1. 1.Department of Computer Science and Information EngineeringNational Dong Hwa UniversityHualienTaiwan

Personalised recommendations