Browse > Article
http://dx.doi.org/10.3837/tiis.2018.07.022

Improved Contrast for Threshold Random-grid-based Visual Cryptography  

Hu, Hao (China National Digital Switching System Engineering and Technological Research Center)
Shen, Gang (Zhengzhou Information Science and Technology Institute)
Fu, Zhengxin (Zhengzhou Information Science and Technology Institute)
Yu, Bin (Zhengzhou Information Science and Technology Institute)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.12, no.7, 2018 , pp. 3401-3420 More about this Journal
Abstract
Pixel expansion and contrast are two major performance parameters for visual cryptography scheme (VCS), which is a type of secret image sharing. Random Grid (RG) is an alternative approach to solve the pixel expansion problem. Chen and Tsao proposed the first (k, n) RG-based VCS, and then Guo et al., Wu et al., Shyu, and Yan et al. significantly improved the contrast in recent years. However, the investigations on improving the contrast of threshold RG-based VCS are not sufficient. In this paper, we develop a contrast-improved algorithm for (k, n) RG-based VCS. Theoretical analysis and experimental results demonstrate that the proposed algorithm outperformers the previous threshold algorithms with better visual quality and a higher accuracy of contrast.
Keywords
Secret image sharing; visual cryptography; random grid; threshold; contrast;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. Shen, F. Liu, Z. Fu, and B. Yu, "New insight into linear algebraic technique to construct visual cryptography scheme for general access structure," Multimedia Tools and Applications, vol.72, no.16, pp.14511-14533, 2017.
2 Z. Fu and B. Yu, "Optimal pixel expansion of deterministic visual cryptography scheme," Multimedia Tools and Applications, vol.73, no.3, pp.1177-1193, 2014.   DOI
3 S. Shyu, and M. Chen, "Optimum pixel expansions for threshold visual secret sharing schemes," IEEE Transactions on Information Forensics and Security, vol.6, no.3, pp.960-969, 2011.   DOI
4 G. Shen, F. Liu, Z. Fu, and B. Yu, "Perfect contrast XOR-based visual cryptography schemes via linear algebra," Designs Codes and Cryptography, vol.85, no.1, pp.15-37, 2017.   DOI
5 A. De Bonis and A. De Santis, "Randomness in secret sharing and visual cryptography schemes," Theoretical Computer Science, vol.314, no.3, pp.351-374, 2004.   DOI
6 Y. C. Chen, "Fully incrementing visual cryptography from a succinct non-monotonic structure," IEEE Transactions on Information Forensics and Security, vol.12, no.5, pp.1082-1091, 2017.   DOI
7 X. Yan, S. Wang, X. Niu, and C. N. Yang, "Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality," Digital Signal Processing, vol.38, no.C, pp.53-65, 2015.   DOI
8 Y. Ren, F. Liu, T. Guo, R. Feng, and D. Lin, "Cheating prevention visual cryptography scheme using Latin square," IET Information Security, vol.11, no.4, pp.211-219, 2017.   DOI
9 F. Liu, C. Wu, and X. Lin, "Cheating immune visual cryptography scheme," IET Information Security, vol.5, no.1, pp.51-59, 2011.   DOI
10 Z. Wang, G. Arce, and G. Di Crescenzo, "Halftone visual cryptography via error diffusion," IEEE Transactions on Information Forensics and Security, vol.4, no.3, pp.383-396, 2009.   DOI
11 S. Cimato, A. R. Prisco, and D. Santis, "Probabilistic visual cryptography schemes," The Computer Journal, vol.49, no.1 pp.97-107, 2006.   DOI
12 M. Naor and A. Shamir, "Visual cryptography," in Proc. of Workshop on the Theory and Application of of Cryptographic Techniques. vol.950, pp.1-12, 1994.
13 O. Kafri and E. Keren, "Encryption of pictures and shapes by random grids," Optics Letters, vol.12, no.6, pp.377-379, 1987.   DOI
14 G. Ateniese, C. Blundo, A. De Santis, and D. Stinson, "Visual cryptography for general access structures," Information and Computation, vol.129, no.2, pp.86-106, 1996.   DOI
15 S. Shivendra and A. Suneeta, "Progressive Visual Cryptography with Unexpanded Meaningful Shares," ACM Transactions on Multimedia Computing, Communications, and Applications, vol.12, no.4, pp.1-24, 2016.
16 C. Yang, H. Shih, C. Wu, and L. Harn, "k out of n region incrementing scheme in visual cryptography," IEEE Transactions on Circuits and Systems for Video Technology, vol.22, no.5, pp.799-810, 2012.   DOI
17 G. Wang, W. Yan, and M. Kankanhalli, "Content based authentication of visual cryptography," Multimedia Tools and Applications, vol.76, no.7, pp.9427-9441, 2017.   DOI
18 C. Yang, "New visual secret sharing schemes using probabilistic method," Pattern Recognition Letters, vol.25, no.4, pp. 481-494, 2014.   DOI
19 S. Shyu, "Image encryption by random grids," Pattern Recognition, vol.40, no.3, pp.1014-1031, 2007.   DOI
20 S. Shyu, "Image encryption by multiple random grids," Pattern Recognition, vol.42, no.7, pp.1582-1596, 2009.   DOI
21 T. Chen and K. Tsao, "Visual secret sharing by random grids revisited," Pattern Recognition, vol.42, no.9, pp.2203-2217, 2009.   DOI
22 T. Chen and K. Tsao, "Threshold visual secret sharing by random grids," Journal of Systems and Software, vol.84, no.7, pp.1197-1208, 2011.   DOI
23 X. Wu and W. Sun, "Random grid-based visual secret sharing for general access structures with cheat-preventing ability," Journal of Systems and Software, vol.85, no.5 pp.1119-1134, 2011.   DOI
24 X. Wu and W. Sun, "Visual secret sharing for general access structures by random grids," IET Information Security, vol.6, no.4, pp.299-309, 2012.   DOI
25 X. Yan, Y. Lu, H. Huang, L. Liu, and S. Wan, "Quality-adaptive threshold visual secret sharing by random grids," in Proc. of IEEE International Conference on Signal and Image Processing, pp. 323-327, 2017.
26 S. Shyu, "Visual cryptograms of random grids for general access structures," IEEE Transactions on Circuits and Systems for Video Technology, vol.23, no.3, pp.414-424, 2013.   DOI
27 X. Wu and W. Sun, "Random grid-based visual secret sharing with abilities of OR and XOR decryptions," Journal of Visual Communication and Image Representation, vol.24, no.1, pp.48-62, 2013.   DOI
28 T. Chen and K. Tsao, "User-friendly random-grid-based visual secret sharing," IEEE Transactions on Circuits and Systems for Video Technology, vol.21, no.11, pp.1693-1703, 2011.   DOI
29 X. Yan and Y. Lu, "Participants increasing for threshold random grids-based visual secret sharing," Journal of Real-Time Image Processing, vol. 14, no.1, pp.13-24, 2018.   DOI
30 H. C. Chao and T. Y. Fan, "Random-grid based progressive visual secret sharing scheme with adaptive priority," Digital Signal Processing, vol.68, pp.69-80, 2017.   DOI
31 Z. Fu and B. Yu, "Visual cryptography and random grids schemes," in Proc. of 12th International Workshop on Digital-Forensics and Watermarking, pp.109-122, 2013.
32 X. Yan, X. Liu, and C. N. Yang, "An enhanced threshold visual secret sharing based on random grids," Journal of Real-Time Image Processing, pp.1-13, 2015.
33 C. N. Yang, C. C. Wu, and D. S. Wang, "A discussion on the relationship between probabilistic visual cryptography and random grid," Information Sciences, vol.278, no.10, pp.141-173, 2014.   DOI
34 T. Guo, F. Liu, and C. Wu, "Threshold visual secret sharing by random grids with improved contrast," Journal of Systems and Software, vol.86, no.8, pp.2094-2109, 2013.   DOI
35 X. Wu and W. Sun, "Improving the visual quality of random grid-based visual secret sharing," Signal Processing, vol.93, no.5, pp.977-995, 2013.   DOI
36 S. Shyu, "Visual cryptograms of random grids for threshold access structures," Theoretical Computer Science, vol.565, pp.30-49, 2015.   DOI