Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Enhancement of Information Carrying and Decoding for Visual Cryptography with Error Correction

Published: 18 September 2023 Publication History

Abstract

Recently, three visual cryptography schemes with t-error-correcting capability (VCSs-tEC) were introduced for preventing the shadows carrying additional information from being corrupted by noise interference. However, the concerns on VCS-tEC, such as the average amount of carrying information, decoding of information from shadows, and the demonstration way of a secret, should be considered and improved. In this article, two schemes, namely the (k, n) probabilistic VCS-tEC (PVCS-tEC) and the (2, n) deterministic VCS-tEC (DVCS-tEC), are proposed. The concept of probabilistic VCS is combined with the Bose-Chaudhuri-Hocquenghem code (BCH code) for designing the (k, n) PVCS-tEC. Furthermore, some constant-weight BCH codewords are adopted to build the (2, n)-DVCS-tEC. Comprehensive results and experiments are demonstrated to clarify the enhancement of information-carrying and decoding by the two proposed methods.

References

[1]
Bella Bose and Thammavarapu RN Rao. 1982. Theory of unidirectional error correcting/detecting codes. IEEE Transactions on Computers6 (1982), 521–530.
[2]
Bing Chen, Wei Lu, Jiwu Huang, Jian Weng, and Yicong Zhou. 2022. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Transactions on Dependable and Secure Computing 19, 2 (2022), 978–991.
[3]
S. Cimato, R. De Prisco, and A. De Santis. 2006. Probabilistic visual cryptography schemes. Computer Journal 49, 1 (2006), 97–107.
[4]
Philip A Eisen and Douglas R Stinson. 2002. Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. Designs, Codes and Cryptography 25, 1 (2002), 15–61.
[5]
Y. C. Hou. 2003. Visual cryptography for color images. Pattern Recognition 36, 7 (2003), 1619–1629.
[6]
Xingxing Jia, Yusheng Guo, Xiangyang Luo, Daoshun Wang, and Chaoyang Zhang. 2022. A perfect secret sharing scheme for general access structures. Information Sciences 595 (2022), 54–69.
[7]
Xingxing Jia, Daoshun Wang, Daxin Nie, and Chaoyang Zhang. 2018. Collaborative visual cryptography schemes. IEEE Transactions on Circuits and Systems for Video Technology 28, 5 (2018), 1056–1070.
[8]
Harsh Kasyap and Somanath Tripathy. 2021. Privacy-preserving decentralized learning framework for healthcare system. ACM Transactions on Multimedia Computing, Communications, and Applications 17, 2s (2021), 1–24.
[9]
Sandip Kundu and Sudhakar M. Reddy. 1990. On symmetric error correcting and all unidirectional error detecting codes. IEEE Transactions on Computers 39, 6 (1990), 752–761.
[10]
Chi-Sung Laih and Ching-Nung Yang. 1996. On the analysis and design of group theoretical t-syEC/AUED codes. IEEE Transactions on Computers 45, 1 (1996), 103–108.
[11]
Ankita Lathey and Pradeep K Atrey. 2015. Image enhancement in encrypted domain over cloud. ACM Transactions on Multimedia Computing, Communications, and Applications 11, 3 (2015), 1–24.
[12]
Peng Li, Zuquan Liu, and Ching-Nung Yang. 2018. A construction method of (t, k, n)-essential secret image sharing scheme. Signal Processing: Image Communication 65 (2018), 210–220.
[13]
Peng Li, Pei-Jun Ma, Xiao-Hong Su, and Ching-Nung Yang. 2012. Improvements of a two-in-one image secret sharing scheme based on gray mixing model. Journal of Visual Communication and Image Representation 23, 3 (2012), 441–453.
[14]
Sian-Jheng Lin and Ja-Chen Lin. 2007. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognition 40, 12 (2007), 3652–3666.
[15]
Yanxiao Liu and Chingnung Yang. 2017. Scalable secret image sharing scheme with essential shadows. Signal Processing: Image Communication 58 (2017), 49–55.
[16]
Zuquan Liu, Guopu Zhu, Feng Ding, Xiangyang Luo, Sam Kwong, and Peng Li. 2022. Contrast-enhanced color visual cryptography for (k, n) threshold schemes. ACM Transactions on Multimedia Computing, Communications and Applications 18, 3s (2022), 1–16.
[17]
Zuquan Liu, Guopu Zhu, Yuan-Gen Wang, Jianquan Yang, and Sam Kwong. 2020. A novel (t, s, k, n)-threshold visual secret sharing scheme based on access structure partition. ACM Transactions on Multimedia Computing, Communications, and Applications 16, 4 (2020), 1–21.
[18]
M. Naor and A. Shamir. 1995. Visual cryptography. Lecture Notes in Computer Science 950, 1 (1995), 1–12.
[19]
Wesley Peterson. 1960. Encoding and error-correction procedures for the bose-chaudhuri codes. IRE Transactions on Information Theory 6, 4 (1960), 459–470.
[20]
Pauline Puteaux, Félix Yriarte, and William Puech. 2023. A secret JPEG image sharing method over GF (\(2^M\)) galois fields. IEEE Transactions on Circuits and Systems for Video Technology 33, 6 (2023), 3030–3042.
[21]
A. Shamir. 1979. How to share a secret. Communications of the ACM 22, 11 (1979), 612–613.
[22]
Gang Shen, Feng Liu, Zhengxin Fu, and Bin Yu. 2017. Perfect contrast XOR-based visual cryptography schemes via linear algebra. Designs, Codes and Cryptography 85, 1 (2017), 15–37.
[23]
Shyong Jian Shyu and Ming Chiang Chen. 2015. Minimizing pixel expansion in visual cryptographic scheme for general access structures. IEEE Transactions on Circuits and Systems for Video Technology 25, 9 (2015), 1557–1561.
[24]
Chih-Ching Thien and Ja-Chen Lin. 2002. Secret image sharing. Computers & Graphics 26, 5 (2002), 765–770.
[25]
Eric R Verheul and Henk CA Van Tilborg. 1997. Constructions and properties of k out of n visual secret sharing schemes. Designs, Codes and Cryptography 11, 2 (1997), 179–196.
[26]
Jonathan Weir, Wei-Qi Yan, and Mohan S Kankanhalli. 2012. Image hatching for visual cryptography. ACM Transactions on Multimedia Computing, Communications, and Applications 8, 2S (2012), 32.
[27]
Xiaotian Wu and Ching-Nung Yang. 2019. A combination of color-black-and-white visual cryptography and polynomial based secret image sharing. Journal of Visual Communication and Image Representation 61 (2019), 74–84.
[28]
Xiaotian Wu and Peng Yao. 2023. Boolean-based two-in-one secret image sharing by adaptive pixel grouping. ACM Transactions on Multimedia Computing, Communications and Applications 19, 1 (2023), 1–23.
[29]
Zhihua Xia, Qi Gu, Wenhao Zhou, Lizhi Xiong, Jian Weng, and Naixue Xiong. 2023. STR: Secure computation on additive shares using the share-transform-reveal strategy. IEEE Transactions on Computers (2023). DOI:
[30]
Lizhi Xiong, Xiao Han, Ching-Nung Yang, and Zhihua Xia. 2023. RDH-DES: Reversible data hiding over distributed encrypted-image servers based on secret sharing. ACM Transactions on Multimedia Computing, Communications and Applications 19, 1 (2023), 1–19.
[31]
Xuehu Yan, Lintao Liu, Longlong Li, and Yuliang Lu. 2021. Robust secret image sharing resistant to noise in shares. ACM Transactions on Multimedia Computing, Communications, and Applications 17, 1 (2021), 1–22.
[32]
Xuehu Yan and Yuliang Lu. 2017. Contrast-improved visual secret sharing based on random grid for general access structure. Digital Signal Processing 71 (2017), 36–45.
[33]
Xuehu Yan, Yuliang Lu, Lintao Liu, and Xianhua Song. 2020. Reversible image secret sharing. IEEE Transactions on Information Forensics and Security 15 (2020), 3848–3858.
[34]
C.N. Yang. 2004. New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25, 4 (2004), 486–494.
[35]
Ching-Nung Yang and Dao-Shun Wang. 2014. Property analysis of XOR-based visual cryptography. IEEE Transactions on Circuits and Systems for Video Technology 24, 2 (2014), 189–197.
[36]
Ching-Nung Yang, Chih-Cheng Wu, and Dao-Shun Wang. 2014. A discussion on the relationship between probabilistic visual cryptography and random grid. Information Sciences 278 (2014), 141–173.
[37]
Ching-Nung Yang and Yi-Yun Yang. 2021. On the analysis and design of visual cryptography with error correcting capability. IEEE Transactions on Circuits and Systems for Video Technology 31, 6 (2021), 2465–2479.

Cited By

View all
  • (2024)Pseudo Label Association and Prototype-Based Invariant Learning for Semi-Supervised NIR-VIS Face RecognitionIEEE Transactions on Image Processing10.1109/TIP.2024.336453033(1448-1463)Online publication date: 1-Jan-2024
  • (2024)Unsupervised NIR-VIS Face Recognition via Homogeneous-to-Heterogeneous Learning and Residual-Invariant EnhancementIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334617619(2112-2126)Online publication date: 1-Jan-2024
  • (2024)Implementing Full Threshold Secret Sharing Scheme by Finite Field Arithmetic2024 4th International Symposium on Computer Technology and Information Science (ISCTIS)10.1109/ISCTIS63324.2024.10698812(899-903)Online publication date: 12-Jul-2024

Index Terms

  1. Enhancement of Information Carrying and Decoding for Visual Cryptography with Error Correction

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 20, Issue 1
      January 2024
      639 pages
      EISSN:1551-6865
      DOI:10.1145/3613542
      • Editor:
      • Abdulmotaleb El Saddik
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 18 September 2023
      Online AM: 05 August 2023
      Accepted: 28 July 2023
      Revised: 30 April 2023
      Received: 17 December 2022
      Published in TOMM Volume 20, Issue 1

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Secret sharing
      2. visual cryptography
      3. error correction
      4. carrying information
      5. decoding

      Qualifiers

      • Research-article

      Funding Sources

      • National Natural Science Foundation of China
      • Guangdong Basic and Applied Basic Research Foundation
      • National Science and Technology Council

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)125
      • Downloads (Last 6 weeks)24
      Reflects downloads up to 13 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Pseudo Label Association and Prototype-Based Invariant Learning for Semi-Supervised NIR-VIS Face RecognitionIEEE Transactions on Image Processing10.1109/TIP.2024.336453033(1448-1463)Online publication date: 1-Jan-2024
      • (2024)Unsupervised NIR-VIS Face Recognition via Homogeneous-to-Heterogeneous Learning and Residual-Invariant EnhancementIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334617619(2112-2126)Online publication date: 1-Jan-2024
      • (2024)Implementing Full Threshold Secret Sharing Scheme by Finite Field Arithmetic2024 4th International Symposium on Computer Technology and Information Science (ISCTIS)10.1109/ISCTIS63324.2024.10698812(899-903)Online publication date: 12-Jul-2024
      • (2024)Enhancing Healthcare Imaging Security: Color Secret Sharing Protocol for the Secure Transmission of Medical ImagesIEEE Access10.1109/ACCESS.2024.342693512(100200-100216)Online publication date: 2024

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media