Sharing More Information in Visual Cryptography Scheme with Block Expansion

  • Peng LiEmail author
  • Ching-Nung Yang
  • Dan Tang
  • Jianfeng Ma
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 895)


Visual cryptography scheme (VCS) shares secret image into shadows. Without computing, stacking shadows can reveal the secret image. In this paper, we propose a VCS with block expansion. Each shadow pixel is expanded into a 4-pixel block with extra secret information embedded in. In the revealing process, the secret image can be revealed by stacking shadows. In the meanwhile, we can reveal the extra shared secret information by computation.


Visual cryptography Secret sharing Secret image sharing Block expansion 



This work was supported by the National Natural Science Foundation of China (No. 61602173).


  1. 1.
    Naor, M., Shamir, A.: Visual cryptography. In EUROCRYPT 1994, Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer, Berlin (1995)Google Scholar
  2. 2.
    Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25(4), 481–494 (2004)CrossRefGoogle Scholar
  3. 3.
    Cimato, S., Prisco, R., Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2006)CrossRefGoogle Scholar
  4. 4.
    Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recogn. 40(12), 3633–3651 (2007)CrossRefGoogle Scholar
  5. 5.
    Feng, J.B., Wu, H.C., Tsai, C.S., Chang, Y.F., Chu, Y.P.: Visual secret sharing for multiple secrets. Pattern Recogn. 41(12), 3572–3581 (2008)CrossRefGoogle Scholar
  6. 6.
    Liu, F., Wu, C.K.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307–322 (2011)CrossRefGoogle Scholar
  7. 7.
    Wang, D.S., Yi, F., Li, X.B.: On general construction for extended visual cryptography schemes. Pattern Recogn. 42(11), 3071–3082 (2009)CrossRefGoogle Scholar
  8. 8.
    Yang, C.N., Wang, D.S.: Property analysis of XOR-based visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 24(2), 189–197 (2014)CrossRefGoogle Scholar
  9. 9.
    Ou, D., Sun, W., Wu, X.: Non-expansible XOR-based visual cryptography scheme with meaningful shares. Signal Process. 108, 604–621 (2015)CrossRefGoogle Scholar
  10. 10.
    Wu, X., Sun, W.: Extended capabilities for XOR-based visual cryptography. IEEE Trans. Inf. Forensics Secur. 9(10), 1592–1605 (2017)CrossRefGoogle Scholar
  11. 11.
    Shamir, A.: How to share a secret. Commun. Assoc. Comput. Mach. 22, 612–613 (1979)MathSciNetzbMATHGoogle Scholar
  12. 12.
    Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26, 765770 (2002)CrossRefGoogle Scholar
  13. 13.
    Yang, C.N., Huang, S.M.: Constructions and properties of k out of n scalable secret image sharing. Opt. Commun. 283(9), 1750–1762 (2010)CrossRefGoogle Scholar
  14. 14.
    Yang, C.N., Chu, Y.Y.: A general (k, n) scalable secret image sharing scheme with the smooth scalability. J. Syst. Softw. 84(10), 1726–1733 (2011)CrossRefGoogle Scholar
  15. 15.
    Li, P., Yang, C.N., Wu, C.C., Kong, Q., Ma, Y.: Essential secret image sharing scheme with different importance of shadows. J. Vis. Commun. Image Represent. 24(7), 1106–1114 (2013)CrossRefGoogle Scholar
  16. 16.
    Yang, C.N., Li, P., Wu, C.C., Cai, S.R.: Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. Signal Process. Image Commun. 31, 1–9 (2015)CrossRefGoogle Scholar
  17. 17.
    Li, P., Yang, C.N., Zhou, Z.: Essential secret image sharing scheme with the same size of shadows. Digit. Signal Process. 50, 51–60 (2016)CrossRefGoogle Scholar
  18. 18.
    Li, P., Liu, Z., Yang, C.N.: A construction method of (t, k, n)-essential secret image sharing scheme. Signal Process. Image Commun. 65, 210–220 (2018)CrossRefGoogle Scholar
  19. 19.
    Lin, S.J., Lin, J.C.: VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recogn. 40, 3652–3666 (2007)CrossRefGoogle Scholar
  20. 20.
    Yang, C.N., Ciou, C.B.: Image secret sharing method with two decoding-options: lossless recovery and previewing capability. Image Vis. Comput. 28, 1600–1610 (2010)CrossRefGoogle Scholar
  21. 21.
    Li, P., Ma, P.J., Su, X.H., Yang, C.N.: Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Represent. 23, 441453 (2012)Google Scholar
  22. 22.
    Li, P., Yang, C.N., Kong, Q., Ma, Y., Liu, Z.: Sharing more information in gray visual cryptography scheme. J. Vis. Commun. Image Represent. 24, 1380–1393 (2013)CrossRefGoogle Scholar
  23. 23.
    Li, P., Yang, C.N., Kong, Q.: A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. J. Real-Time Image Process. 14(1), 1–10 (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Peng Li
    • 1
    Email author
  • Ching-Nung Yang
    • 2
  • Dan Tang
    • 3
  • Jianfeng Ma
    • 1
  1. 1.Department of Mathematics and PhysicsNorth China Electric Power UniversityBaodingChina
  2. 2.Department of CSIENational Dong Hwa UniversityHualien CityTaiwan
  3. 3.School of Software EngineerChengdu University of Information TechnologyChengduChina

Personalised recommendations