Skip to main content

Visual Cryptography for Natural Images and Visual Voting

  • Conference paper
Information Security and Cryptology (Inscrypt 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7763))

Included in the following conference series:

Abstract

Visual cryptography is a type of secret sharing which encodes a secret image into several shadow images in such a way that the stacking of certain images printed on transparencies will reveal the secret. The decryption is done directly by the human visual system without any extra calculations. Most of previous researches essentially handle only binary images, as the underling encoding matrices are all Boolean matrices. For gray-level image, we need to halftone it into binary image before encoding. Although binary image can be used to simulate gray-level image, its visual quality is deteriorated, especially for fine images. The first part of this paper presents a method to provide much more gray-levels than previous schemes, given the same pixel expansion, and thus establishes the visual cryptography scheme suitable for natural images. The second part of this paper presents a visual voting scheme that need no counting process and guarantees anonymity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Information and Computation 129, 86–106 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  2. Blundo, C., De Bonis, A., De Santis, A.: Improved schemes for visual cryptography. Designs, Codes and Cryptography 24, 255–278 (2001)

    Article  MATH  Google Scholar 

  3. Blundo, C., Cimato, S., De Santis, A.: Visual cryptography schemes with optimal pixel expansion. Theoretical Computer Science 369, 169–182 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  4. Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. Journal of Cryptology 12(4), 261–289 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  5. Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. Theoretical Computer Science 374, 261–276 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  6. Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theoretical Computer Science 240(2), 471–485 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  7. Hou, Y.C.: Visual cryptography for color images. Pattern Recognition 1773, 1–11 (2003)

    Google Scholar 

  8. Kang, I.K., Arce, G.R., Lee, H.K.: Color extended visual cryptography using error diffusion. IEEE Transactions on Image Processing 20(1), 132–145 (2011)

    Article  MathSciNet  Google Scholar 

  9. Knuth, D.E.: The Art of Computer Programming. Sorting and Searching, vol. 3. Addison-Wesley (1998)

    Google Scholar 

  10. Liu, F., Wu, C.K.: Embedded extended visual cryptography schemes. IEEE Transactions on Information Forensics & Security 6(2), 307–322 (2011)

    Article  Google Scholar 

  11. Liu, F., Wu, C.K., Lin, X.J.: Colour visual cryptography schemes. IET Information Security 2, 151–165 (2008)

    Article  MathSciNet  Google Scholar 

  12. Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Designs, Codes and Cryptography 50, 215–227 (2009)

    Article  MathSciNet  Google Scholar 

  13. Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. In: WSCG Conference 2002, pp. 303–412 (2002)

    Google Scholar 

  14. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  15. Shyu, S.J., Chen, M.C.: Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Transactions on Information Forensics and Security 6(3), 960–969 (2011)

    Article  Google Scholar 

  16. Wang, D.S., Dong, L., Li, X.B.: Towards shift tolerant visual secret sharing schemes. IEEE Transactions on Information Forensics and Security 6(2), 323–337 (2011)

    Article  Google Scholar 

  17. Wang, Z.M., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Transactions on Information Forensics and Security 4(3), 383–396 (2009)

    Article  Google Scholar 

  18. Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Transactions on Image Processing 15(8), 2441–2453 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Guo, T., Liu, F., Wu, C. (2013). Visual Cryptography for Natural Images and Visual Voting. In: Kutyłowski, M., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2012. Lecture Notes in Computer Science, vol 7763. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38519-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38519-3_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38518-6

  • Online ISBN: 978-3-642-38519-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics