Abstract
Region Incrementing Visual Cryptography (RIVC) is an important and active research area. In (2, n) region incrementing visual cryptographic scheme, a single secret image is divided into multiple secret regions. We need at least 2 secret shares to be superimposed to reveal the 1st secret region. By stacking more and more shares we get the entire image revealed. All the existing schemes for RIVCS suffer from the problems like color reversal, pixel expansion and low contrast. Also conventional RIVCS schemes generate noise like shares. The management of these shares is also problem, as there is no way to identify these shares. Thus we are proposing a new Extended RIVC scheme which uses the characteristics of both RIVCS and Extended VCS which adds a meaningful cover image to the shares. Our proposed method solves all the above mentioned drawbacks of the existing schemes. The main contributions in this paper are: a) No pixel expansion b)Meaningful share images c)Increased contrast d) No color reversal e) Improved Security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4), 481–494 (2004)
Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2006)
Wang, D., Yi, F., Li, X.: Probabilistic visual secret sharing schemes for grey-scale images and color images. Inform. Sci. 181(11), 2189–2208 (2011)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structures. Information and Computation 129(2), 86–106 (1996)
Fang, W.P., Lin, J.C.: Progressive viewing and sharing of sensitive images. Patt. Recog. Image Anal. 16(4), 638–642 (2006)
Fang, W.P.: Multilayer progressive secret image sharing. In: Proc. 7th WSEAS, pp. 112–116 (2007)
Fang, W.P.: Friendly progressive visual secret sharing. Patt. Recog. 41(4), 1410–1414 (2008)
Hou, Y.-C., Quan, Z.-Y.: Progressive Visual Cryptography with Unexpanded Shares. IEEE Transactions On Circuits And Systems For Video Technology 21(11) (November2011)
Nakajima, M., Yamaguchi, Y.: Enhancing registration tolerance of extended visual cryptography for natural images. J. Electron. Imag. 13(3), 654–662 (2004)
Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)
Wang, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography via error diffusion. IEEE Trans. Image Process. 4(3), 383–396 (2009)
Hou, Y.C.: Visual cryptography for color images. Patt.Recognit. 36(7), 1619–1629 (2003)
Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. J. Electron. Imag. 15(3), 033019:1–033019:13 (2005)
Wang, R.-Z., Hsu, S.-F.: Tagged Visual Cryptography. IEEE Signal Process. Lett. 18(11) (November 2011)
Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognit. 40, 3633–3651 (2007)
Feng, J.B., Wu, H.C., Tsai, C.S., Chang, Y.F., Chu, Y.P.: Visual secret sharing for multiple secrets. Pattern Recognit. 41(12), 3572–3581 (2008)
Wang, R.Z.: Region incrementing visual cryptography. IEEE Signal Process. Lett. 16(8), 659–662 (2009)
Yang, C.-N., Shih, H.-W., Wu, C.-C., Harn, L.: K Out of n Region Incrementing Scheme in Visual Cryptography. IEEE Trans. on Circuits and Systems for Video Technology 22(5) (May 2012)
Shyu, S.J., Jiang, H.-W.: Efficient Construction for Region Incrementing Visual Cryptography. IEEE Trans.on Circuits and Systems for Video Technology 22(5) (May 2012)
Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250, 143–161 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this paper
Cite this paper
Anila, T., Wilscy, M. (2013). An Extended Region Incrementing Visual Cryptography Scheme Using Unexpanded Meaningful Shares. In: Prasath, R., Kathirvalavakumar, T. (eds) Mining Intelligence and Knowledge Exploration. Lecture Notes in Computer Science(), vol 8284. Springer, Cham. https://doi.org/10.1007/978-3-319-03844-5_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-03844-5_35
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03843-8
Online ISBN: 978-3-319-03844-5
eBook Packages: Computer ScienceComputer Science (R0)