Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme
Two of the main areas of research in visual cryptography have been on improving the visual quality of the recovered image and in reducing the pixel expansion of the shares. This paper addresses both of these visual cryptography issues. First, a method to enhance the perceived visual quality of the recovered image using various image filtering techniques is presented. In particular, these image filtering techniques are used to enhance the local and global contrasts of a grayscale image. Second, a multi-pixel block size invariant visual cryptography scheme that maintains the relative density of local neighboring pixels is proposed. This method encrypts blocks of pixels based on whether the total number of black pixels within the respective blocks is above or below a certain threshold. In conjunction, these approaches effectively improve on the perceived visual quality of a recovered visual cryptography image.
KeywordsVisual cryptography visual quality image filtering size invariant multi-pixel encoding
Unable to display preview. Download preview PDF.
- 4.Cimato, S., Yang, C.: Visual cryptography and secret image sharing. Digital Imaging and Computer Vision Series. Taylor & Francis (2011)Google Scholar
- 5.Floyd, R.W., Steinberg, L.: An adaptive algorithm for spatial greyscale. Proceedings of the Society of Information Display 17, 75–77 (1976)Google Scholar
- 6.Hou, Y.-C., Tu, S.-F.: A visual cryptographic technicque for chromatic images using multi-pixel encoding method. Journal of Research and Practice in Information Technology 37(2) (2005)Google Scholar
- 7.Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 82(10), 2172–2177 (1999)Google Scholar
- 13.Wu, X., Wong, D.S., Li, Q.: Threshold visual cryptography scheme for color images with no pixel expansion. In: Proceedings of the Second Symposium International Computer Science and Computation Technology, pp. 310–315 (2009)Google Scholar