An Extended Region Incrementing Visual Cryptography Scheme Using Unexpanded Meaningful Shares

  • T. Anila
  • M. Wilscy
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8284)

Abstract

Region Incrementing Visual Cryptography (RIVC) is an important and active research area. In (2, n) region incrementing visual cryptographic scheme, a single secret image is divided into multiple secret regions. We need at least 2 secret shares to be superimposed to reveal the 1st secret region. By stacking more and more shares we get the entire image revealed. All the existing schemes for RIVCS suffer from the problems like color reversal, pixel expansion and low contrast. Also conventional RIVCS schemes generate noise like shares. The management of these shares is also problem, as there is no way to identify these shares. Thus we are proposing a new Extended RIVC scheme which uses the characteristics of both RIVCS and Extended VCS which adds a meaningful cover image to the shares. Our proposed method solves all the above mentioned drawbacks of the existing schemes. The main contributions in this paper are: a) No pixel expansion b)Meaningful share images c)Increased contrast d) No color reversal e) Improved Security.

Keywords

region incrementing visual cryptography secret shares pixel expansion secrecy levels color reversal 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  2. 2.
    Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4), 481–494 (2004)CrossRefGoogle Scholar
  3. 3.
    Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2006)CrossRefGoogle Scholar
  4. 4.
    Wang, D., Yi, F., Li, X.: Probabilistic visual secret sharing schemes for grey-scale images and color images. Inform. Sci. 181(11), 2189–2208 (2011)CrossRefMATHMathSciNetGoogle Scholar
  5. 5.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structures. Information and Computation 129(2), 86–106 (1996)CrossRefMATHMathSciNetGoogle Scholar
  6. 6.
    Fang, W.P., Lin, J.C.: Progressive viewing and sharing of sensitive images. Patt. Recog. Image Anal. 16(4), 638–642 (2006)Google Scholar
  7. 7.
    Fang, W.P.: Multilayer progressive secret image sharing. In: Proc. 7th WSEAS, pp. 112–116 (2007)Google Scholar
  8. 8.
    Fang, W.P.: Friendly progressive visual secret sharing. Patt. Recog. 41(4), 1410–1414 (2008)CrossRefMATHGoogle Scholar
  9. 9.
    Hou, Y.-C., Quan, Z.-Y.: Progressive Visual Cryptography with Unexpanded Shares. IEEE Transactions On Circuits And Systems For Video Technology 21(11) (November2011)Google Scholar
  10. 10.
    Nakajima, M., Yamaguchi, Y.: Enhancing registration tolerance of extended visual cryptography for natural images. J. Electron. Imag. 13(3), 654–662 (2004)CrossRefGoogle Scholar
  11. 11.
    Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)CrossRefGoogle Scholar
  12. 12.
    Wang, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography via error diffusion. IEEE Trans. Image Process. 4(3), 383–396 (2009)Google Scholar
  13. 13.
    Hou, Y.C.: Visual cryptography for color images. Patt.Recognit. 36(7), 1619–1629 (2003)CrossRefGoogle Scholar
  14. 14.
    Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. J. Electron. Imag. 15(3), 033019:1–033019:13 (2005)Google Scholar
  15. 15.
    Wang, R.-Z., Hsu, S.-F.: Tagged Visual Cryptography. IEEE Signal Process. Lett. 18(11) (November 2011)Google Scholar
  16. 16.
    Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognit. 40, 3633–3651 (2007)CrossRefMATHGoogle Scholar
  17. 17.
    Feng, J.B., Wu, H.C., Tsai, C.S., Chang, Y.F., Chu, Y.P.: Visual secret sharing for multiple secrets. Pattern Recognit. 41(12), 3572–3581 (2008)CrossRefMATHGoogle Scholar
  18. 18.
    Wang, R.Z.: Region incrementing visual cryptography. IEEE Signal Process. Lett. 16(8), 659–662 (2009)CrossRefGoogle Scholar
  19. 19.
    Yang, C.-N., Shih, H.-W., Wu, C.-C., Harn, L.: K Out of n Region Incrementing Scheme in Visual Cryptography. IEEE Trans. on Circuits and Systems for Video Technology 22(5) (May 2012)Google Scholar
  20. 20.
    Shyu, S.J., Jiang, H.-W.: Efficient Construction for Region Incrementing Visual Cryptography. IEEE Trans.on Circuits and Systems for Video Technology 22(5) (May 2012)Google Scholar
  21. 21.
    Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250, 143–161 (2001)CrossRefMATHGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2013

Authors and Affiliations

  • T. Anila
    • 1
  • M. Wilscy
    • 1
  1. 1.Dept. of Computer ScienceUniversity of KeralaThiruvananthapuramIndia

Personalised recommendations