Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1655925.1655954acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicisConference Proceedingsconference-collections
research-article

Multi-level visual secret sharing scheme with smooth-looking

Published: 24 November 2009 Publication History

Abstract

In traditional visual secret sharing (VSS) scheme, the pixel expansion is a drawback which not only increases the transmission cost, but also distorts the recovered secret image. This paper proposes a visual secret sharing scheme which hides a secret into two share images without pixel expansion. It provides high quality of recovered secret image. The experimental results show the stacking result of share images in our scheme is smoother than others.

References

[1]
R. M. Davis, "The data encryption standard in perspective," IEEE Comunications Magazine, vol. 16, no. 6, pp. 5--9, 1978.
[2]
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Communications of ACM, vol. 21, no. 2, pp. 120--126, 1978.
[3]
C. N. Yang, "New visual secret sharing schemes using probabilistic method," Pattern Recognition Letters, vol. 25, no. 4, pp. 481--494, 2004.
[4]
S. F. Tu and Y. C. Hou, "Design of visual cryptographic methods with smooth-looking decoded images of invariant size for grey-level images," The imaging Science Journal," vol. 55, no. 2, pp. 90--101, 2007.
[5]
H. Zhang, X. Wang, W. Cao, and Y. Huang, "Visual cryptography for general access structure using pixel-block aware encoding," Journal of Computers, vol. 3, no. 12, pp. 68--75, 2008.
[6]
Y. C. Hou and S. F. Tu, "A visual cyptographic technique for chromatic images using multi-pixel encoding method," Journal of Research and Practice in Information Technology, vol. 37, no. 2, 2005.
[7]
M. Naor and A. Shamir, "Visual cryptography," Advance in Cryptology: Eurpocrypt'94, Lecture Notes In Computer Science, Springer Verlag, Germany, vol. 950, pp. 1--12, 1995.
[8]
F. Bao, C. C. Lee, and M. S. Hwang, "Cryptanalysis and improvement on batch verifying multiple RSA digital signatures", Applied Mathematics and Computation, vol. 172, issue 2, pp. 1195--1200, Jan. 2006.
[9]
M. S. Hwang and C. C. Lee, "Research issues and challenges for multiple digital signatures", International Journal of Network Security, vol. 1, no. 1, pp. 1--7, July 2005.
[10]
J. B. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang and Y. P. Chu, "Visual secret sharing for multiple secrets", Pattern Recognition, vol. 41, no. 12, pp. 3572--3581, 2008
[11]
Wu, H. C. and Chang, C. C., "Sharing visual multi-secrets using circle shares," Computer Standards&Interfaces, vol. 28, no. 1, pp. 123--135, Jul. 2005.
[12]
Chen, T. H., Chang, C. C., Wu, C. S. and Lou, D. C., "On the security of a copyright protection scheme based on visual cryptography," Computer Standards&Interfaces, vol. 31, no. 1, pp. 1--5, Jan. 2009.
[13]
Chang, C. C., Chen, T. H. and Liu, L. J., "Preventing cheating in computational visual cryptography," Fundamenta Informaticae, vol. 92, pp. 1--16, Mar. 2009.

Cited By

View all
  • (2021)Probabilistic Grayscale Visual Cryptography Scheme Using Multi-Pixel Encoding2021 17th International Conference on Computational Intelligence and Security (CIS)10.1109/CIS54983.2021.00101(459-463)Online publication date: Nov-2021
  • (2019)Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) ApproachIEEE Transactions on Image Processing10.1109/TIP.2018.287437828:2(896-911)Online publication date: 1-Feb-2019
  • (2019)Improving Visual Quality for Probabilistic and Random Grid SchemesImproving Image Quality in Visual Cryptography10.1007/978-981-13-8289-5_5(75-95)Online publication date: 9-Jun-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIS '09: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
November 2009
1479 pages
ISBN:9781605587103
DOI:10.1145/1655925
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • AICIT
  • ETRI
  • KISTI

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 November 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. code book
  2. non-pixel expansion shares
  3. visual cryptography
  4. visual secret sharing

Qualifiers

  • Research-article

Funding Sources

Conference

ICIS '09
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)5
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Probabilistic Grayscale Visual Cryptography Scheme Using Multi-Pixel Encoding2021 17th International Conference on Computational Intelligence and Security (CIS)10.1109/CIS54983.2021.00101(459-463)Online publication date: Nov-2021
  • (2019)Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) ApproachIEEE Transactions on Image Processing10.1109/TIP.2018.287437828:2(896-911)Online publication date: 1-Feb-2019
  • (2019)Improving Visual Quality for Probabilistic and Random Grid SchemesImproving Image Quality in Visual Cryptography10.1007/978-981-13-8289-5_5(75-95)Online publication date: 9-Jun-2019
  • (2016)A Novel Approach towards Authentication by Generating Strong PasswordsProceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies10.1145/2905055.2905128(1-3)Online publication date: 4-Mar-2016
  • (2011)Color image cryptography scheme based on visual cryptography2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies10.1109/ICSCCN.2011.6024584(404-407)Online publication date: Jul-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media