Abstract
This chapter aims to help the readers to get familiar with the classical VC algorithms. These algorithms are also stepstones for developing more complicated algorithms in later chapters. First, we introduce the general framework of VC, such as access structure and general requirements (security and contrast). Then, we introduce the classical deterministic VC with pixel expansion as developed in Naor and Shamir’s seminal work. Next, the size-invariant algorithms are summarized, including the probabilistic VC and random grid VC. Some examples will be discussed for the readers that are new to this topic. Finally, various security levels in visual cryptography will be discussed, including strong security and several weak securities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Please note that calling \(\mathsf {L}_i\) a set is not mathematically vigorous, since the elements in \(\mathsf {L}_i\) are allowed to be the same. We stick to this notation since it is widely used in the literature of probabilistic VC.
References
Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)
Chen, T.H., Tsao, K.H.: Visual secret sharing by random grids revisited. Pattern Recognit. 42(9), 2203–2217 (2009)
Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84(7), 1197–1208 (2011)
Fang, W.P., Lin, J.C.: Visual cryptography with extra ability of hiding confidential data. J. Electron. Imaging 15(2), 1–7 (2006)
Hou, Y.C., Wei, S.C., Lin, C.Y.: Random-grid-based visual cryptography schemes. IEEE Trans. Circuits Syst. Video Technol. 24(5), 733–744 (2014)
Hsu, C.S., Tu, S.F., Hou, Y.C.: An optimization model for visual cryptography schemes with unexpanded shares. In: Esposito, F., Raś, Z.W., Malerba, D., Semeraro, G. (eds.) Foundations of Intelligent Systems, pp. 58–67. Springer, Heidelberg (2006)
Huang, H.C., Fang, W.C.: Authenticity preservation with histogram-based reversible data hiding and quadtree concepts. Sensors 11(10), 9717–9731 (2011)
Huang, H.C., Chang, F.C., Fang, W.C.: Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans Consum. Electron. 57(2), 779–787 (2011)
Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. E82-A(10), 2172–2177 (1999)
Iwamoto, M.: A weak security notion for visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 7(2), 372–382 (2012)
Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377–379 (1987)
Liu, F., Guo, T., Wu, C., Qian, L.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331–342 (2012)
Naor, M., Shamir, A.: Visual cryptography. In: Proceeding of the Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT 1994), Perugia, Italy, pp. 1–12 (1994)
Shyu, S.J.: Image encryption by random grids. Pattern Recognit. 40(3), 1014–1031 (2007)
Shyu, S.J.: Image encryption by multiple random grids. Pattern Recognit. 42(7), 1582–1596 (2009)
Thajeel, S.A.N., Sulong, G.: A novel approach for detection of copy move forgery using completed robust local binary pattern. J. Inf. Hiding Multimed. Signal Process. 6(2), 351–364 (2015)
Wu, X.T., Sun, W.: Generalized random grid and its applications in visual cryptography. IEEE Trans. Inf. Forensics Secur. 8(9), 1541–1553 (2013)
Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4), 481–494 (2004)
Yang, C.Y., Wang, W.F., Wang, Y.F., Wang, R.Z.: A simple watermarking scheme with high perceptual quality for still color images based on RWM and centroid. J. Inf. Hiding Multimed. Signal Process. 6(3), 577–590 (2015)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Yan, B., Xiang, Y., Hua, G. (2020). Basic Visual Cryptography Algorithms. In: Improving Image Quality in Visual Cryptography. Signals and Communication Technology. Springer, Singapore. https://doi.org/10.1007/978-981-13-8289-5_2
Download citation
DOI: https://doi.org/10.1007/978-981-13-8289-5_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8288-8
Online ISBN: 978-981-13-8289-5
eBook Packages: EngineeringEngineering (R0)