Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Visual Cryptography by Random Grids with Identifiable Shares
Authors: Ran-Zan Wang, Yao-Ting Lee
Abstract:
This paper proposes a visual cryptography by random grids scheme with identifiable shares. The method encodes an image O in two shares that exhibits the following features: (1) each generated share has the same scale as O, (2) any share singly has noise-like appearance that reveals no secret information on O, (3) the secrets can be revealed by superimposing the two shares, (4) folding a share up can disclose some identification patterns, and (5) both of the secret information and the designated identification patterns are recognized by naked eye without any computation. The property to show up identification patterns on folded shares establishes a simple and friendly interface for users to manage the numerous shares created by VC schemes.Keywords: Image Encryption, Image Sharing, Secret Sharing, Visual Cryptography.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1055299
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1766References:
[1] M. Naor and A. Shamir, "Visual cryptography," Advances in Cryptography: Eurocrypt-94, pp. 1-12, 1995.
[2] G. Ateniese, C. Blundo, A. De Santis, and D.R. Stinson, "Visual cryptography for general access structures," Information and Computation, Vol. 129, No. 2, pp. 86-106, 1996.
[3] C. Blundo and A. De Santis and D.R. Stinson, "On the contrast in visual cryptography schemes," Journal of Cryptology, Vol. 12, No. 4, pp. 261-289, 1999.
[4] Y.C. Hou, "Visual cryptography for color images," Pattern Recognition, Vol. 36, No. 7, pp. 1619-1629, 2003.
[5] C.C. Lin and W.H. Tsai, "Visual cryptography for gray-level images by dithering techniques," Pattern Recognition Letters, Vol. 24, pp. 349-358, 2003.
[6] Z. Zhou, G.R. Arce, and G.D. Crescenzo, "Halftone visual cryptography," IEEE Transactions on Image Processing, Vol. 15, No. 8, pp. 2441-2453, 2006.
[7] W.P. Fang and J.C. Lin, "Visual cryptography with extra ability of hiding confidential data," Journal of Electronic Imaging, Vol. 15, No. 2, 0230201-0230207, 2006.
[8] R.Z. Wang, Region Incrementing Visual Cryptography, IEEE Signal Processing Letters, Vol. 16, No. 8, pp. 659-662, 2009.
[9] M. Gnanaguruparan and S. Kak, "Recursive hiding of secrets in visual cryptography," Cryptologia, Vol. 26, pp. 68−76, 2002.
[10] O. Kafri and E. Keren, "Encryption of pictures and shapes by random grids," Optics Letters, Vol. 12, no. 6, pp. 377-379, 1987.
[11] R. Ito, H. Kuwakado, and H. Tanaka, "Image Size Invariant Visual Cryptography," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, E82, No. 10, pp. 2172-2177, 1999.
[12] C.N. Yang and T.S. Chen, "Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion," Pattern Recognition Letters, Vol. 26, No. 2, pp. 193-206, 2005.
[13] C. Blundo, S. Cimato and A.D. Santis," Visual cryptography schemes with optimal pixel expansion," Theoretical Computer Science, Vol. 369, pp. 169-182, 2006.
[14] S.J. Shyu, "Image encryption by random grids," Pattern Recognition, Vol. 40, No. 3, pp. 1014-1031, 2007.
[15] S.J. Shyu, "Image encryption by multiple random grids," Pattern Recognition, Vol. 42, No. 7, pp. 1582-1596, 2009.
[16] T.H. Chen, and K.H. Tsao, "Visual cryptography by random grids revisited," Pattern Recognition, vol. 42, pp. 2203-2217, 2009.
[17] T.H. Chen, K.H. Tsao and K.C. Wei, "Multiple-Image Encryption by Rotating Random Grids," Proceedings of the 9th Inter. Conf. on Intel. Systems Design and Applications, pp. 252-256, 2009.