Abstract
Security and contrast are the two key parameters in visual cryptography schemes. Security condition is fulfilled if each share reveals no information of the secret image and the secret image cannot be obtained if there are k-1 shares together. The security and reliability of the visual cryptography scheme can be greatly enhanced with recursion. The contrast of the reconstructed secret image is less compared to the existing visual cryptography schemes. The proposed model provides improved contrast and reduces the noise in the recreated image without any additional computation. This scheme uses the new pixel patterns to enhance the contrast of the decrypted image. The contrast of the recursive visual cryptography scheme can be enhanced based on new pixel patterns for white pixels.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Naor, M., Shamir, A.: Visual cryptography, advances in cryptology-Eurocrypt’94. LNCS 950, 1–12 (1995)
Gnanaguruparan, M., Kak, S.: Recursive hiding of secrets in visual cryptography. Cryptologia 26(1), 68–76 (2002)
Parakh, A., Kak, S.: Recursive secret sharing for distributed storage and information hiding. In: Proceedings of the IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS), pp. 1–3 (2009)
Parakh, A., Kak, S.: Space efficient secret sharing: a recursive approach, Cryptology ePrint Archive: Report 2009/365 (2009)
Parakh, A., Kak, S.: A tree based recursive information hiding scheme. In: Proceedings of the IEEE Communication and Information System Security Symposium, Cape Town, South Africa (2010)
Revenkar, P.S., Anjum, A., Gandhare, W.Z.: Survey of Visual Cryptography Schemes. Int. J. Security & Its Appl. 4(2) (2010)
Monoth, T., Anto, B.P.: Recursive visual cryptography using random basis column pixel expansion. In: Proceedings of the IEEE International Conference on Information Technology (ICIT), Rourkela, Orissa, pp. 41–43 (2007) (IEEE Computer Society, ISBN : 0-7695-3068-0)
Monoth, T., Anto, B.P.: Tamperproof transmission of fingerprints using visual cryptography schemes. J. Procedia Comput. Sci. 2, 143–148 (2010) (Elsevier, Netherlands, ISSN : 1877-0509)
Monoth, T., Anto, B.P.: Contrast-enhanced visual cryptography schemes based on additional pixel patterns. In: Proceedings of the IEEE International Conference on Cyber Worlds (CW 2010), NTU, Singapore, pp. 171–178 (2010) (IEEE Computer Society, ISBN : 978-0-7695-4215-7)
Monoth, T., Anto, B.P.: Security-enhanced visual cryptography schemes based on recursion. Commun. Comput. Inf. Sci. (CCIS) 140, 255–262 (2011) (Springer-Verlag, Germany, ISSN : 1865-0929)
De Bonis, A., De Santis, A.: Randomness in visual cryptography. LNCS 1770, 626–638 (2000)
Monoth, T., Anto, B.P.: Analysis and design of tamperproof and contrast-enhanced secret sharing based on visual cryptography schemes. Ph.D thesis, Kannur University, Kerala, India (2012) (http:// shodhganga.inflibnet.ac.in)
Monoth, T.: Anto, B.P.: Achieving Optimal Contrast in Visual Cryptography Schemes Without Pixel Expansion. Int. J. Recent Trends in Eng. (IJRTE), 1(1), 468–471 (2009) (www.academypublisher.com, ISSN: 1787-9617)
Monoth, T., Anto, B.P.: Contrast-enhanced visual cryptography schemes based on perfect reconstruction of white pixels and additional basis matrix. Adv. Intell. Syst. Comput. (AISC): 412:361–368 (2016). (Springer Science, Germany, ISSN : 2194-5357)
Yang, C.-N., Chen, T.-S.: Colored visual cryptography scheme based on additive color mixing. Pattern Recognit. 41(10), 3114–3129 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Monoth, T. (2019). Contrast-Enhanced Recursive Visual Cryptography Scheme Based on Additional Basis Matrices. In: Satapathy, S., Bhateja, V., Das, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 105. Springer, Singapore. https://doi.org/10.1007/978-981-13-1927-3_18
Download citation
DOI: https://doi.org/10.1007/978-981-13-1927-3_18
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1926-6
Online ISBN: 978-981-13-1927-3
eBook Packages: EngineeringEngineering (R0)