Equivalence Proof of Traditional and Random Grid-Based (2, 2) Visual Secret Sharing

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 298)


Visual secret sharing (VSS) has attracted considerable attention to scientists and engineers as another branch alongside conventional cryptography to protect the sensitive visual information from several rapacious behaviors. In the literature, there are a number of several techniques used to protect the visual information, among which traditional VSS and random grid (RG)-based VSS are the primary branches. In this letter, we show, by examples, the two means are equal. In addition, the color representation of traditional VSS and RG-based VSS found it different from digital applications like images. Based on the given examples, it is demonstrated that the color representation of the two means can be the same and confirm with digital processing applications.


Visual cryptography Visual secret sharing Random grid Equivalence proof Color representation 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  2. 2.
    Weir, J., Yan, W.: A comprehensive study of visual cryptography. In: Shi, Y.Q. (ed.) Transactions on DHMS V. LNCS, vol. 6010, pp. 70–105. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  3. 3.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1), 143–161 (2001)CrossRefMATHGoogle Scholar
  4. 4.
    Yang, C.-N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4), 481–494 (2004)CrossRefGoogle Scholar
  5. 5.
    Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemese based on Boolean operations. Pattern Recognit. 40(10), 2776–2785 (2007)CrossRefMATHGoogle Scholar
  6. 6.
    Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optics Letters 12(6), 377–379 (1987)CrossRefGoogle Scholar
  7. 7.
    Shyu, S.J.: Image encryption by random grids. Pattern Recognition 40(3), 1014–1031 (2007)CrossRefMATHGoogle Scholar
  8. 8.
    Yan, X., Wang, S., El-Latif, A.A.A., Niu, X.: Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery. IEEE Trans. on Circ. and Sys. for Video Tech. 21(11), 1693–1703 (2011); Accepted for publication in Multimedia tools and application (2013), doi: 10.1007/s11042-013-1784-2,2013Google Scholar
  9. 9.
    Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Signal Processing (2012)Google Scholar
  10. 10.
    Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Security 4(3), 383–396 (2009)CrossRefGoogle Scholar
  11. 11.
    Guo, T., Liu, F., Wu, C.K.: Threshold visual secret sharing by random grids with improved contrast. Journal of Systems and Software (2013)Google Scholar
  12. 12.
    Chen, T.-H., Tsao, K.-H.: Threshold visual secret sharing by random grids. Journal of Systems and Software 84(7), 1197–1208 (2011)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.School of Computer Science and Technology, Harbin Institute of TechnologyHarbinChina

Personalised recommendations