Skip to main content
Log in

Progressive viewing and sharing of sensitive images

  • Application Problems
  • Published:
Pattern Recognition and Image Analysis Aims and scope Submit manuscript

Abstract

The paper proposes a progressive viewing method useful in sharing a sensitive image. As in visual cryptography, this method characterizes its ability to recover the image by stacking transparencies without any computation. However, the method balances the sensitivity and the daily-processing convenience of the image.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. M. Naor and A. Shamir, “Visual Cryptography,” Advances in Cryptology—Eurocrypt’94, Lecture Notes in Computer Science (Springer-Verlag, Berlin, 1995), Vol. 950, pp. 1–12.

    Google Scholar 

  2. G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, “Visual Cryptography for General Access Structures,” Information and Computation 129(2), 86–106 (1996).

    Article  MathSciNet  Google Scholar 

  3. C. Blundo and A. de Santis, “Visual Cryptography Schemes with Perfect Reconstruction of Black Pixels,” Computers and Graphics 22(4), 449–455 (1998).

    Article  Google Scholar 

  4. Y. C. Hou, “Visual Cryptography for Color Images,” Pattern Recognition 36, 1619–1629.

  5. M. Naor and A. Shamir, “Improving the Contrast via the Cover Base, Presented at Security in Communication Networks,” in Visual Cryptography, II, Ed. by M. Lomas (AmalE, Italy, September 16–17, 1996), Lecture Notes in Computer Science (Springer, Berlin, 1997), Vol. 1189, pp. 197–202.

    Google Scholar 

  6. D. R. Stinson, “An Introduction to Visual Cryptography,” Presented at Public Key Solutions’97, Toronto, Canada, April 28–30, 1997.

  7. G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, “Visual Cryptography for General Access Structures,” Inform. Comput. 129, 86–106 (1996).

    Article  Google Scholar 

  8. G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, “Extended Capabilities for Visual Cryptography,” Theoretical Computer Science 250, 134–161 (2001).

    Article  Google Scholar 

  9. C. Blundo, A. De Santis, and D. R. Stinson, “On the Contrast in Visual Cryptography Schemes,” J. Cryptology 12, 261–289 (1999).

    Article  MATH  MathSciNet  Google Scholar 

  10. M. Naor and B. Pinkas, “Visual Authentication and Identification,” in Advances in Cryptology—CRYPTO’97, Ed. by B. Kaliski, Jr., Lecture Notes in Computer Science (Springer, Berlin, 1997), Vol. 1294, pp. 322–336.

    Google Scholar 

  11. V. Rijmen and B. Preneel, “ELcient Colour Visual Encryption for Shared Colors of Benetton,” Eurocrypto’96, Rump Session, Berlin, 1996.

  12. A. D. Rubin, “Independent One-Time Passwords,” Comput. Systems 9, 15–27 (1996).

    Google Scholar 

  13. A. Shamir, “visual Cryptanalysis,” in Proceedings of the Eurocrypt’98, Espoo, 1998.

  14. C. C. Chang, C. S. Tsai and T. S. Chen, “A Technique for Sharing a Secret Color Image,” in Proceedings of the Ninth National Conference on Information Security, Taichung, May, 1999, pp. LXIII–LXXII.

  15. Y. C. Hou, F. Lin, and C. Y. Chang, “Improvement and Implementation of the Secret Color Image Sharing Technique,” in Proceedings of the Fifth Conference on Information Management, Taipei, November 1999, pp. 592–597.

  16. Y. C. Hou, F. Lin, and C. Y. Chang, “A New Approach on 256 Color Secret Image Sharing Technique,” MIS Review (9), 89–105 (1999).

  17. Y. C. Hou, C. Y. Chang, and F. Lin, “Visual Cryptography for Color Images Based on Color Decomposition,” in Proceedings of the Fifth Conference on Information Management, Taipei, November 1999, pp. 584–591.

  18. C. C. Chang and J. C. Chuang, “An Image Intellectual Property Protection Scheme for Gray-Level Images Using Visual Secret Sharing Strategy,” Pattern Recognition Letter (23), 931–941 (2002).

Download references

Author information

Authors and Affiliations

Authors

Additional information

The text was submitted by the authors in English.

Wen-Pinn Fang was born in 1971 in Taiwan, Republic of China. He received his BS degree in mechanical engineering from National Sun-Yet-Sans University in 1994, and MS degree in mechanical engineering from National Chiao Tung University in 1998. In 2006 he received his PhD in Computer Science Department of National Chiao Tung University. His recent research interests include image sharing and image processing.

Ja-Chen Lin was born in 1955 in Taiwan, Republic of China. He received his BS degree in computer science in 1977 and MS degree in applied mathematics in 1979, both from National Chiao Tung University, Taiwan. In 1988 he received his PhD in mathematics from Purdue University, United States. In 1981–1982, he was an instructor at National Chiao Tung University. From 1984 to 1988, he was a graduate instructor at Purdue University. He joined the Department of Computer and Information Science at National Chiao Tung University in August 1988 and is currently a professor there. His recent research interests include pattern recognition and image processing. Dr. Lin is a member of the Phi-Tau-Phi Scholastic Honor Society.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fang, W.P., Lin, J.C. Progressive viewing and sharing of sensitive images. Pattern Recognit. Image Anal. 16, 632–636 (2006). https://doi.org/10.1134/S1054661806040080

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S1054661806040080

Keywords

Navigation