Skip to main content

Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images

  • Chapter
Transactions on Data Hiding and Multimedia Security IX

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 8363))

Abstract

Visual cryptography is a kind of cryptography that can be decoded directly by the human visual system. For instance, a secret image is obtained by simply stacking several transparencies. Extended visual cryptography is capable of introducing meaningful images on transparencies which can conceal the existence of “secret” in the transparencies. A scheme consisting of two techniques, parallel error diffusion and optimum tone mapping, can preserve image quality for encrypting continuous-tone images. It quickly encrypts images with no pixel expansion and achieves high contrast. This paper proposes a generalized scheme that can encrypt more than one secret images within transparencies. Different secrets can be reconstructed from different combinations of transparencies. Experimental results are also shown to examine the effectiveness of the new scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Visual cryptography for general access structure. Information and Computation 129, 86–106 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  2. Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.: Extended capabilities for visual cryptography. Theoretical Computer Science 250, 143–161 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  3. Cimato, S., Prisco, R.D., Santis, A.D.: Probabilistic visual cryptography schemes. The Computer Journal 49(1), 97–107 (2006)

    Article  Google Scholar 

  4. Fu, M., Au, O.: A novel method to embed watermark in different halftone images: data hiding by conjugate error diffusion (dhced). In: Intl Conference on Acoustics, Speech, and Signal Processing, vol. III, pp. 529–532 (2003)

    Google Scholar 

  5. Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. on Fundamentals E82-A(10), 2127–2177 (1999)

    Google Scholar 

  6. Myodo, E., Takagi, K., Yoneyama, A.: Deterministic tone mapping to gamut area of halftone visual cryptography. IEICE Trans. on Fundamentals J93-A(12), 805–820 (2010)

    Google Scholar 

  7. Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. Journal of WSCG 10(2), 303–310 (2002)

    Google Scholar 

  8. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  9. Wang, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography via error diffusion. IEEE Trans. on Information Forensics and Security 4(3), 383–396 (2009)

    Article  Google Scholar 

  10. Wu, C., Thompson, G., Stanich, M.: Digital watermarking and steganography via overlays of halftone images. Electrical Engineering IBM Research Report RC23267 (W0407-013). IBM (2004)

    Google Scholar 

  11. Yamaguchi, Y.: An extended visual cryptography scheme for continuous-tone images. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 228–242. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  12. Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25(4), 481–494 (2004)

    Article  Google Scholar 

  13. Yang, C.N., Chen, T.S.: Extended visual secret sharing schemes: improving the shadow image quality. International Journal of Pattern Recognition and Artificial Intelligence 21, 879–898 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Yamaguchi, Y. (2014). Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images. In: Shi, Y.Q., Liu, F., Yan, W. (eds) Transactions on Data Hiding and Multimedia Security IX. Lecture Notes in Computer Science, vol 8363. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55046-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-55046-1_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-55045-4

  • Online ISBN: 978-3-642-55046-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics