Skip to main content
Log in

Contrast-enhanced visual cryptography schemes based on block pixel patterns

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

Block-wise visual cryptography scheme is size invariant and it provides perfect security. It eliminates pixel expansion and security problems but it faces contrast glitches in decrypted images. The encryption is performed on a block of pixels rather than a single pixel. In this paper, we have proposed a contrast-enhanced block-wise scheme in which the encryption of the block is based on the selection of the block-pixel pattern. The selection of the block pattern depends on the image types. We have constructed algorithms for the decomposition of blocks based on various block-pixel patterns and conducted an experimental study on a thousand different natural, text, horizontal striped, vertical striped and zigzag striped images. Furthermore, we have made an evaluation based on horizontal, vertical, square, zigzag, and snake block pixel patterns. Experiments were performed on (2, 2), (2, n), (n, n) and (k, n) visual cryptography schemes. The study reveals that the selection of a block-pixel pattern plays an inevitable role in the encryption, and attains a better contrast to the recovered image.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Maurya R, Rao GE, Rajitha B (2022) Visual cryptography for securing medical images using a combination of hyperchaotic-based pixel, bit scrambling, and DNA encoding. Int J Inform Technol 14(6):3227–3234

    Article  Google Scholar 

  2. Mullai A, Mani K (2021) Enhancing the security in RSA and elliptic curve cryptography based on addition chain using simplified Swarm optimization and particle swarm optimization for mobile devices. Int J Inform Technol 13(2):551–564

    Article  Google Scholar 

  3. Tulsani H, Chawla P, Gupta R (2017) A novel steganographic model for securing binary images. Int J Inform Technol 9(3):273–280

    Article  Google Scholar 

  4. Naor M, Shamir A (1995) Visual cryptography. Adv Cryptology-Eurocrypt’94 LNCS 950:1–12

    MathSciNet  MATH  Google Scholar 

  5. Ahuja B, Doriya R (2022) Bifold-crypto-chaotic steganography for visual data security. Int J Inform Technol 14(2):637–648

    Article  Google Scholar 

  6. Ito R, Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE Trans Fundam Electron Commun Comput Sci 82(10):2172–2177

    Google Scholar 

  7. Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377–379. https://doi.org/10.1364/OL.12.000377

    Article  Google Scholar 

  8. Shyu SJ (2007) Image encryption by random grids. Pattern Recogn 40(3):1014–1031. https://doi.org/10.1016/j.patcog.2006.02.025

    Article  MATH  Google Scholar 

  9. Chen Y-F, Chan Y-K, Huang C-C, Tsai M-H, Chu Y-P (2007) A multiple-level visual secret-sharing scheme without image size expansion. Inf Sci 177(21):4696–4710. https://doi.org/10.1016/j.ins.2007.05.011

    Article  MathSciNet  MATH  Google Scholar 

  10. Hou Y-C, Tu Shu-Fen (2005) A visual cryptographic technique for chromatic images using multi-pixel encoding method. J Res Pract Inform Technol 37(2):179–191

    Google Scholar 

  11. Jisha TE, Monoth T, WiP (2019) Security enhanced size invariant visual cryptography with Perfect Reconstruction of White Pixels. Information Systems Security. ICISS 2019. Lecture notes in Computer Science. Springer, Cham, pp 279–289. https://doi.org/10.1007/978-3-030-36945-3_15

    Chapter  Google Scholar 

  12. Tu SF, Hou YC (2007) Design of visual cryptographic methods with smooth-looking decoded images of invariant size for grey-level images. Imaging Sci J 55(2):90–101. https://doi.org/10.1179/174313107X165290

    Article  Google Scholar 

  13. Zhang H et al (2008) Visual cryptography for General Access structure using pixel- block aware encoding. J Comput 312:68–75

    Google Scholar 

  14. Monoth T (2010) “Contrast-enhanced visual cryptography schemes based on additional pixel patterns.“ International Conference on Cyberworlds. IEEE.https://doi.org/10.1109/CW.2010.39

  15. Lin T-L et al (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37(12):7858–7869

    Article  Google Scholar 

  16. Guo T, Liu F, ChuanKun Wu (2011) “Multi-pixel encryption visual cryptography.“ International Conference on Information Security and Cryptology. Springer, Berlin, Heidelberg,

  17. Chow Y-W, Susilo W, Duncan S, Wong (2012) “Enhancing the perceived visual quality of a size invariant visual cryptography scheme.“ International Conference on Information and Communications Security. Springer, Berlin, Heidelberg,

  18. Hou Y-C et al (2013) Block-based progressive visual secret sharing. Inf Sci 233:290–304

    Article  Google Scholar 

  19. Huang Y-J, Jun-Dong C (2013) “Non-expanded visual cryptography scheme with authentication.“ 2013 International Symposium on Next-Generation Electronics. IEEE,

  20. Lee C-C et al (2014) A new visual cryptography with multi-level encoding. J Visual Lang Comput 25(3):243–250

    Article  Google Scholar 

  21. Al-Khalid RI et al (2017) A secure visual cryptography scheme using private key with invariant share sizes. J Softw Eng Appl 10(01):1

    Article  Google Scholar 

  22. Sun R, Fu Z (2020) Size-invariant visual Cryptography with Improved Perceptual Quality for Grayscale Image. IEEE Access 8:163394–163404

    Article  Google Scholar 

  23. Denghui Zhang, Zhaoquan Gu, "A High-Quality Authenticatable Visual Secret Sharing Scheme Using SGX", Wireless Communications and Mobile Computing. vol. 2021, Article ID 6660709, 12 pages, 2021. https://doi.org/10.1155/2021/6660709

  24. Ren L, Zhang D (2022) A QR code-based user-friendly visual cryptography scheme. Sci Rep 12(1):1–8

    Google Scholar 

  25. Mohanasundaram A, Aruna SK (2022) Improved Henon chaotic map-based Progressive Block-based visual cryptography strategy for securing sensitive data in a cloud EHR system. Int J Intell Net 3:109–12

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T E Jisha.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jisha, T.E., Monoth, T. Contrast-enhanced visual cryptography schemes based on block pixel patterns. Int. j. inf. tecnol. 15, 2445–2455 (2023). https://doi.org/10.1007/s41870-023-01286-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-023-01286-8

Keywords

Navigation