Region-in-Region Incrementing Visual Cryptography Scheme

  • Ching-Nung Yang
  • Yi-Chin Lin
  • Chih-Cheng Wu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7809)

Abstract

Recently, some region incrementing VCSs (RIVCSs) were proposed, which can gradually reconstruct secrets in a single image. In RIVCS, the secret image is subdivided into multiple secrecy level regions, in such a way that more shadows can be used to reveal the more secrecy level regions. The incrementing region property provides an attractive feature, which enables progressive decoding. However, the secret level regions of all previous RIVCSs are disjointed, which any two secrecy level regions do not have the same overlapping areas. In this paper, we discuss a (k, n) region-in-region incrementing VCS (RiRIVCS). Our (k, n)-RiRIVCS has (n(k+1) secrecy level regions, which the next secrecy level region is in the preceding secrecy level region. Such region allocations in our RiRIVCS have more areas to hide the secret than the non-overlapping regions in the previous RIVCS.

Keywords

Secret sharing Visual cryptography Region incrementing visual cryptography 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  2. 2.
    Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. on Fund. of Elect. Comm. and Comp. Sci. E82-A, 2172–2177 (1999)Google Scholar
  3. 3.
    Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25, 481–494 (2004)CrossRefGoogle Scholar
  4. 4.
    Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. The Computer Journal 49, 97–107 (2006)CrossRefGoogle Scholar
  5. 5.
    Wang, D., Yi, F., Li, X.: Probabilistic visual secret sharing schemes for grey-scale images and color images. Information Sciences 181, 2189–2208 (2011)MathSciNetCrossRefMATHGoogle Scholar
  6. 6.
    Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognition 40, 3633–3651 (2007)CrossRefMATHGoogle Scholar
  7. 7.
    Feng, J.B., Wu, H.C., Tsai, C.S., Chang, Y.F., Chu, Y.P.: Visual Secret sharing for multiple secrets. Pattern Recognition 41, 3572–3581 (2008)CrossRefMATHGoogle Scholar
  8. 8.
    Yang, C.N., Chung, T.H.: A general multi-secret visual cryptography scheme. Optics Communications 283, 4949–4962 (2010)CrossRefGoogle Scholar
  9. 9.
    Tsai, D.S., Chen, T.H., Horng, G.: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognition 40, 2356–2366 (2007)CrossRefMATHGoogle Scholar
  10. 10.
    Yang, C.N., Peng, A.G., Chen, T.S.: MTVSS (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty. Signal Processing 89, 1602–1624 (2009)CrossRefMATHGoogle Scholar
  11. 11.
    Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Designs, Codes and Cryptography 50, 215–227 (2009)MathSciNetCrossRefMATHGoogle Scholar
  12. 12.
    Cimato, S., De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes withreversing. Information Processing Letters 93, 199–206 (2005)MathSciNetCrossRefMATHGoogle Scholar
  13. 13.
    Verheul, E.R., Van Tilborg, H.C.A.: Constructions and properties of k out of n visual secret sharing scheme. Designs, Codes and Cryptography 1, 179–196 (1997)CrossRefMATHGoogle Scholar
  14. 14.
    Yang, C.N., Chen, T.S.: Colored visual cryptography scheme based on additive color mixing. Pattern Recognition 41, 3114–3129 (2008)CrossRefMATHGoogle Scholar
  15. 15.
    Cimato, S., Yang, C.N.: Visual cryptography and secret image sharing. CRC Press, Taylor & Francis (2011)Google Scholar
  16. 16.
    Wang, R.Z.: Region incrementing visual cryptography. IEEE Signal Processing Letters 16, 659–662 (2009)CrossRefGoogle Scholar
  17. 17.
    Shyu, S.J., Jiang, H.W.: Efficient Construction for Region Incrementing Visual Cryptography. IEEE Transactions on Circuits and Systems for Video Technology 22, 769–777 (2012)CrossRefGoogle Scholar
  18. 18.
    Yang, C.N., Shih, H.W., Wu, C.C., Harn, L.: k out of n Region Incrementing Scheme in Visual Cryptography. IEEE Transactions on Circuits and Systems for Video Technology 22, 799–810 (2012)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Ching-Nung Yang
    • 1
  • Yi-Chin Lin
    • 1
  • Chih-Cheng Wu
    • 1
  1. 1.Department of Computer Science and Information EngineeringNational Dong Hwa UniversityTaiwan

Personalised recommendations