Abstract
Visual cryptography is a kind of cryptography that can be decoded directly by the human visual system. For instance, a secret image is obtained by simply stacking several transparencies. Extended visual cryptography is capable of introducing meaningful images on transparencies which can conceal the existence of “secret” in the transparencies. A scheme consisting of two techniques, parallel error diffusion and optimum tone mapping, can preserve image quality for encrypting continuous-tone images. It quickly encrypts images with no pixel expansion and achieves high contrast. This paper proposes a generalized scheme that can encrypt more than one secret images within transparencies. Different secrets can be reconstructed from different combinations of transparencies. Experimental results are also shown to examine the effectiveness of the new scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Visual cryptography for general access structure. Information and Computation 129, 86–106 (1996)
Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.: Extended capabilities for visual cryptography. Theoretical Computer Science 250, 143–161 (2001)
Cimato, S., Prisco, R.D., Santis, A.D.: Probabilistic visual cryptography schemes. The Computer Journal 49(1), 97–107 (2006)
Fu, M., Au, O.: A novel method to embed watermark in different halftone images: data hiding by conjugate error diffusion (dhced). In: Intl Conference on Acoustics, Speech, and Signal Processing, vol. III, pp. 529–532 (2003)
Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. on Fundamentals E82-A(10), 2127–2177 (1999)
Myodo, E., Takagi, K., Yoneyama, A.: Deterministic tone mapping to gamut area of halftone visual cryptography. IEICE Trans. on Fundamentals J93-A(12), 805–820 (2010)
Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. Journal of WSCG 10(2), 303–310 (2002)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Wang, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography via error diffusion. IEEE Trans. on Information Forensics and Security 4(3), 383–396 (2009)
Wu, C., Thompson, G., Stanich, M.: Digital watermarking and steganography via overlays of halftone images. Electrical Engineering IBM Research Report RC23267 (W0407-013). IBM (2004)
Yamaguchi, Y.: An extended visual cryptography scheme for continuous-tone images. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 228–242. Springer, Heidelberg (2012)
Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25(4), 481–494 (2004)
Yang, C.N., Chen, T.S.: Extended visual secret sharing schemes: improving the shadow image quality. International Journal of Pattern Recognition and Artificial Intelligence 21, 879–898 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Yamaguchi, Y. (2014). Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images. In: Shi, Y.Q., Liu, F., Yan, W. (eds) Transactions on Data Hiding and Multimedia Security IX. Lecture Notes in Computer Science, vol 8363. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55046-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-55046-1_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55045-4
Online ISBN: 978-3-642-55046-1
eBook Packages: Computer ScienceComputer Science (R0)