Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels

  • Ching-Nung Yang
  • Tse-Shih Chen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3656)


An extended visual secret sharing (EVSS) scheme with innocent looking (unsuspicious) cover images was firstly proposed by Naor and Shamir. Most recent papers about EVSS schemes are dedicated to get a higher contrast of the concealed secret or a less size of shadow image. The conventional EVSS scheme uses the whiteness of black and white sub pixels to represent the gray level of the covered image while we use the gray sub pixels instead to achieve the high-quality shadow image. The term “high-quality” means that the shadow has high-quality image such as a photo picture.




Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  2. 2.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. ECCC, Electronic Colloquium on Computational Complexity, TR96-012 (1996)Google Scholar
  3. 3.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theoretical Computer Science 250(1-2), 143–161 (2001)MATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    Desmedt, Y., Hou, S., Quisquater, J.: Audio and optical cryptography. In: Advances in Cryptology-Asiacrypt 1998, pp. 392–404. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  5. 5.
    Desmedt, Y., Hou, S., Quisquater, J.: Cerebral cryptography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 62–72. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  6. 6.
    Desmedt, Y., Van Le., T.: Moire cryptography. In: Seventh ACM Conference on Computer and Communications Security (CCS-7), pp. 116–124 (2000)Google Scholar
  7. 7.
    Lukac, R., Plataniotis, K.N.: Bit-Level based secret sharing for image encryption. Pattern Recognition 38(5), 767–772 (2005)MATHCrossRefGoogle Scholar
  8. 8.
    Lukac, R., Plataniotis, K.N.: Image Representation Based Secret Sharing. Communications of the CCISA (Chinese Cryptology & Information Security Association), Special Issue on Image Secret Sharing and Quantum Cryptography 11(2), 103–114 (2005)Google Scholar
  9. 9.
    Lukac, R., Plataniotis, K.N.: Colour Image Secret Sharing. IEE Electronics Letters 40(9), 529–530 (2004)CrossRefGoogle Scholar
  10. 10.
    Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 2nd edn. Prentice Hall, Englewood Cliffs (2002)Google Scholar
  11. 11.
    Eisen, P.A., Stinson, D.R.: Threshold visual cryptography schemes with specified whiteness. Designs, Codes and Cryptography 25(1), 15–61 (2002)MATHCrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Ching-Nung Yang
    • 1
  • Tse-Shih Chen
    • 1
  1. 1.Department of Computer Science and Information EngineeringNational Dong Hwa UniversityHualienTaiwan

Personalised recommendations