Skip to main content

Basic Visual Cryptography Algorithms

  • Chapter
  • First Online:
Improving Image Quality in Visual Cryptography

Part of the book series: Signals and Communication Technology ((SCT))

Abstract

This chapter aims to help the readers to get familiar with the classical VC algorithms. These algorithms are also stepstones for developing more complicated algorithms in later chapters. First, we introduce the general framework of VC, such as access structure and general requirements (security and contrast). Then, we introduce the classical deterministic VC with pixel expansion as developed in Naor and Shamir’s seminal work. Next, the size-invariant algorithms are summarized, including the probabilistic VC and random grid VC. Some examples will be discussed for the readers that are new to this topic. Finally, various security levels in visual cryptography will be discussed, including strong security and several weak securities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Please note that calling \(\mathsf {L}_i\) a set is not mathematically vigorous, since the elements in \(\mathsf {L}_i\) are allowed to be the same. We stick to this notation since it is widely used in the literature of probabilistic VC.

References

  1. Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)

    Article  MathSciNet  Google Scholar 

  2. Chen, T.H., Tsao, K.H.: Visual secret sharing by random grids revisited. Pattern Recognit. 42(9), 2203–2217 (2009)

    Article  Google Scholar 

  3. Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84(7), 1197–1208 (2011)

    Article  Google Scholar 

  4. Fang, W.P., Lin, J.C.: Visual cryptography with extra ability of hiding confidential data. J. Electron. Imaging 15(2), 1–7 (2006)

    Article  Google Scholar 

  5. Hou, Y.C., Wei, S.C., Lin, C.Y.: Random-grid-based visual cryptography schemes. IEEE Trans. Circuits Syst. Video Technol. 24(5), 733–744 (2014)

    Article  Google Scholar 

  6. Hsu, C.S., Tu, S.F., Hou, Y.C.: An optimization model for visual cryptography schemes with unexpanded shares. In: Esposito, F., Raś, Z.W., Malerba, D., Semeraro, G. (eds.) Foundations of Intelligent Systems, pp. 58–67. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Huang, H.C., Fang, W.C.: Authenticity preservation with histogram-based reversible data hiding and quadtree concepts. Sensors 11(10), 9717–9731 (2011)

    Article  Google Scholar 

  8. Huang, H.C., Chang, F.C., Fang, W.C.: Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans Consum. Electron. 57(2), 779–787 (2011)

    Article  Google Scholar 

  9. Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. E82-A(10), 2172–2177 (1999)

    Google Scholar 

  10. Iwamoto, M.: A weak security notion for visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 7(2), 372–382 (2012)

    Article  Google Scholar 

  11. Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377–379 (1987)

    Article  Google Scholar 

  12. Liu, F., Guo, T., Wu, C., Qian, L.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331–342 (2012)

    Article  Google Scholar 

  13. Naor, M., Shamir, A.: Visual cryptography. In: Proceeding of the Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT 1994), Perugia, Italy, pp. 1–12 (1994)

    Google Scholar 

  14. Shyu, S.J.: Image encryption by random grids. Pattern Recognit. 40(3), 1014–1031 (2007)

    Article  Google Scholar 

  15. Shyu, S.J.: Image encryption by multiple random grids. Pattern Recognit. 42(7), 1582–1596 (2009)

    Article  Google Scholar 

  16. Thajeel, S.A.N., Sulong, G.: A novel approach for detection of copy move forgery using completed robust local binary pattern. J. Inf. Hiding Multimed. Signal Process. 6(2), 351–364 (2015)

    Google Scholar 

  17. Wu, X.T., Sun, W.: Generalized random grid and its applications in visual cryptography. IEEE Trans. Inf. Forensics Secur. 8(9), 1541–1553 (2013)

    Article  Google Scholar 

  18. Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4), 481–494 (2004)

    Article  Google Scholar 

  19. Yang, C.Y., Wang, W.F., Wang, Y.F., Wang, R.Z.: A simple watermarking scheme with high perceptual quality for still color images based on RWM and centroid. J. Inf. Hiding Multimed. Signal Process. 6(3), 577–590 (2015)

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Xiang .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Yan, B., Xiang, Y., Hua, G. (2020). Basic Visual Cryptography Algorithms. In: Improving Image Quality in Visual Cryptography. Signals and Communication Technology. Springer, Singapore. https://doi.org/10.1007/978-981-13-8289-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-8289-5_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-8288-8

  • Online ISBN: 978-981-13-8289-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics