Skip to main content

An Extended Region Incrementing Visual Cryptography Scheme Using Unexpanded Meaningful Shares

  • Conference paper
Mining Intelligence and Knowledge Exploration

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 8284))

Abstract

Region Incrementing Visual Cryptography (RIVC) is an important and active research area. In (2, n) region incrementing visual cryptographic scheme, a single secret image is divided into multiple secret regions. We need at least 2 secret shares to be superimposed to reveal the 1st secret region. By stacking more and more shares we get the entire image revealed. All the existing schemes for RIVCS suffer from the problems like color reversal, pixel expansion and low contrast. Also conventional RIVCS schemes generate noise like shares. The management of these shares is also problem, as there is no way to identify these shares. Thus we are proposing a new Extended RIVC scheme which uses the characteristics of both RIVCS and Extended VCS which adds a meaningful cover image to the shares. Our proposed method solves all the above mentioned drawbacks of the existing schemes. The main contributions in this paper are: a) No pixel expansion b)Meaningful share images c)Increased contrast d) No color reversal e) Improved Security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  2. Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4), 481–494 (2004)

    Article  Google Scholar 

  3. Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2006)

    Article  Google Scholar 

  4. Wang, D., Yi, F., Li, X.: Probabilistic visual secret sharing schemes for grey-scale images and color images. Inform. Sci. 181(11), 2189–2208 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  5. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structures. Information and Computation 129(2), 86–106 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  6. Fang, W.P., Lin, J.C.: Progressive viewing and sharing of sensitive images. Patt. Recog. Image Anal. 16(4), 638–642 (2006)

    Google Scholar 

  7. Fang, W.P.: Multilayer progressive secret image sharing. In: Proc. 7th WSEAS, pp. 112–116 (2007)

    Google Scholar 

  8. Fang, W.P.: Friendly progressive visual secret sharing. Patt. Recog. 41(4), 1410–1414 (2008)

    Article  MATH  Google Scholar 

  9. Hou, Y.-C., Quan, Z.-Y.: Progressive Visual Cryptography with Unexpanded Shares. IEEE Transactions On Circuits And Systems For Video Technology 21(11) (November2011)

    Google Scholar 

  10. Nakajima, M., Yamaguchi, Y.: Enhancing registration tolerance of extended visual cryptography for natural images. J. Electron. Imag. 13(3), 654–662 (2004)

    Article  Google Scholar 

  11. Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)

    Article  Google Scholar 

  12. Wang, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography via error diffusion. IEEE Trans. Image Process. 4(3), 383–396 (2009)

    Google Scholar 

  13. Hou, Y.C.: Visual cryptography for color images. Patt.Recognit. 36(7), 1619–1629 (2003)

    Article  Google Scholar 

  14. Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. J. Electron. Imag. 15(3), 033019:1–033019:13 (2005)

    Google Scholar 

  15. Wang, R.-Z., Hsu, S.-F.: Tagged Visual Cryptography. IEEE Signal Process. Lett. 18(11) (November 2011)

    Google Scholar 

  16. Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognit. 40, 3633–3651 (2007)

    Article  MATH  Google Scholar 

  17. Feng, J.B., Wu, H.C., Tsai, C.S., Chang, Y.F., Chu, Y.P.: Visual secret sharing for multiple secrets. Pattern Recognit. 41(12), 3572–3581 (2008)

    Article  MATH  Google Scholar 

  18. Wang, R.Z.: Region incrementing visual cryptography. IEEE Signal Process. Lett. 16(8), 659–662 (2009)

    Article  Google Scholar 

  19. Yang, C.-N., Shih, H.-W., Wu, C.-C., Harn, L.: K Out of n Region Incrementing Scheme in Visual Cryptography. IEEE Trans. on Circuits and Systems for Video Technology 22(5) (May 2012)

    Google Scholar 

  20. Shyu, S.J., Jiang, H.-W.: Efficient Construction for Region Incrementing Visual Cryptography. IEEE Trans.on Circuits and Systems for Video Technology 22(5) (May 2012)

    Google Scholar 

  21. Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250, 143–161 (2001)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Anila, T., Wilscy, M. (2013). An Extended Region Incrementing Visual Cryptography Scheme Using Unexpanded Meaningful Shares. In: Prasath, R., Kathirvalavakumar, T. (eds) Mining Intelligence and Knowledge Exploration. Lecture Notes in Computer Science(), vol 8284. Springer, Cham. https://doi.org/10.1007/978-3-319-03844-5_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03844-5_35

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03843-8

  • Online ISBN: 978-3-319-03844-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics