Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2482513.2482515acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

XOR-based meaningful visual secret sharing by generalized random grids

Published: 17 June 2013 Publication History

Abstract

In recent years, random grid (RG) received much attention for constructing visual secret sharing (VSS) scheme without pixel expansion. But recovered secret image with low visual quality reveals due to the stacking operation. To improve the recovered image quality, XOR-based VSS is adopted. However, shares constructed from XOR-based VSS are random-looking. The noise-like appearance further increases the chance of suspicion on secret image communication and imposes difficulty for managing the shares. In this work, a novel (2,2) generalized RG-based VSS is introduced. By adopting the (2,2) VSS, we propose a XOR-based meaningful VSS where shares with meaningful contents are constructed. Moreover, superior visual quality is provided by this method as well.

References

[1]
G. Ateniese, C. Blundo, A. De Santis, and D. Stinson. Visual Cryptography for General Access Structures. Information and Computation, 129(2):86--106, 1996.
[2]
G. Ateniese, C. Blundo, A. Santis, and D. Stinson. Extended capabilities for visual cryptography. Theoretical Computer Science, 250(1-2):143--161, 2001.
[3]
C. Blundo, A. De Santis, and D. Stinson. On the contrast in visual cryptography schemes. Journal of Cryptology, 12(4):241--289, 1999.
[4]
T. Chen and K. Tsao. Visual secret sharing by random grids revisited. Pattern Recognition, 42(9):2203--2217, 2009.
[5]
T. Chen and K. Tsao. Threshold visual secret sharing by random grids. Journal of Systems and Software, 84:1197--1208, 2011.
[6]
T. Chen and K. Tsao. User-friendly random-grid-based visual secret sharing. Circuits and Systems for Video Technology, IEEE Transactions on, 21(11):1693--1703, 2011.
[7]
S. Cimato, R. De Prisco, and A. De Santis. Probabilistic visual cryptography schemes. The Computer Journal, 49(1):97--107, 2006.
[8]
R. Ito, H. Kuwakado, and H. Tanaka. Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 82(10):2172--2177, 1999.
[9]
O. Kafri and E. Keren. Encryption of pictures and shapes by random grids. Optics letters, 12(6):377--379, 1987.
[10]
I. Kang, G. Arce, and H. Lee. Color extended visual cryptography using error diffusion. Image Processing, IEEE Transactions on, 20(1):132--145, 2011.
[11]
C. Lin and W. Tsai. Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters, 24(1-3):349--358, 2003.
[12]
C. Lin and W. Tsai. Secret image sharing with steganography and authentication. Journal of Systems and Software, 73(3):405--414, 2004.
[13]
F. Liu and C. Wu. Embedded extended visual cryptography schemes. Information Forensics and Security, IEEE Transactions on, 6(2):307--322, 2011.
[14]
M. Naor and A. Shamir. Visual cryptography. Lecture Notes in Computer Science, 950(1):1--12, 1995.
[15]
S. Shyu. Image encryption by random grids. Pattern Recognition, 40(3):1014--1031, 2007.
[16]
S. Shyu. Image encryption by multiple random grids. Pattern Recognition, 42(7):1582--1596, 2009.
[17]
C. Thien and J. Lin. Secret image sharing. Computers & Graphics, 26(5):765--770, 2002.
[18]
P. Tuyls, H. Hollmann, J. Lint, and L. Tolhuizen. Xor-based visual cryptography schemes. Designs, Codes and Cryptography, 37(1):169--186, 2005.
[19]
Z. Wang, G. Arce, and G. Di Crescenzo. Halftone visual cryptography via error diffusion. Information Forensics and Security, IEEE Transactions on, 4(3):383--396, 2009.
[20]
X. Wu and W. Sun. Visual secret sharing for general access structures by random grids. IET information security, 6(4):299--309, 2012.
[21]
X. Wu and W. Sun. Improving the visual quality of random grid-based visual secret sharing. Signal Processing, 93(5):977--995, 2013.
[22]
X. Wu and W. Sun. Random grid-based visual secret sharing with abilities of or and xor decryptions. Journal of Visual Communication and Image Representation, 24(1):48--62, 2013.
[23]
C. Yang. New visual secret sharing schemes using probabilistic method. Pattern Recognijion Letters, 25(4):486--494, 2004.
[24]
Z. Zhou, G. Arce, and G. Di Crescenzo. Halftone visual cryptography. Image Processing, IEEE Transactions on, 15(8):2441--2453, 2006.

Cited By

View all
  • (2023)Meaningful Shares based Single Secret Sharing Scheme using Chinese Remainder Theorem and XOR Operation2023 10th International Conference on Signal Processing and Integrated Networks (SPIN)10.1109/SPIN57001.2023.10116100(597-602)Online publication date: 23-Mar-2023
  • (2021)XOR-based visual secret sharing scheme using pixel vectorizationMultimedia Tools and Applications10.1007/s11042-020-10352-380:10(14609-14635)Online publication date: 1-Apr-2021
  • (2020)A Novel (t, s, k, n)-Threshold Visual Secret Sharing Scheme Based on Access Structure PartitionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/341821216:4(1-21)Online publication date: 17-Dec-2020
  • Show More Cited By

Index Terms

  1. XOR-based meaningful visual secret sharing by generalized random grids

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IH&MMSec '13: Proceedings of the first ACM workshop on Information hiding and multimedia security
    June 2013
    242 pages
    ISBN:9781450320818
    DOI:10.1145/2482513
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 June 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. XOR
    2. meaningful share
    3. visual cryptography
    4. visual quality
    5. visual secret sharing

    Qualifiers

    • Research-article

    Conference

    IH&MMSec '13
    Sponsor:

    Acceptance Rates

    IH&MMSec '13 Paper Acceptance Rate 27 of 74 submissions, 36%;
    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)8
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 25 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Meaningful Shares based Single Secret Sharing Scheme using Chinese Remainder Theorem and XOR Operation2023 10th International Conference on Signal Processing and Integrated Networks (SPIN)10.1109/SPIN57001.2023.10116100(597-602)Online publication date: 23-Mar-2023
    • (2021)XOR-based visual secret sharing scheme using pixel vectorizationMultimedia Tools and Applications10.1007/s11042-020-10352-380:10(14609-14635)Online publication date: 1-Apr-2021
    • (2020)A Novel (t, s, k, n)-Threshold Visual Secret Sharing Scheme Based on Access Structure PartitionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/341821216:4(1-21)Online publication date: 17-Dec-2020
    • (2019)Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applicationsMultimedia Tools and Applications10.1007/s11042-019-7163-x78:13(18503-18530)Online publication date: 1-Jul-2019
    • (2018)Boolean-based Multi Secret Sharing Scheme using Meaningful Shares2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)10.1109/ICICCT.2018.8473323(840-844)Online publication date: Apr-2018
    • (2018)Visual Secret Sharing Technique for Meaningful Shares using Boolean Operation2018 International Conference on Advanced Computation and Telecommunication (ICACAT)10.1109/ICACAT.2018.8933540(1-5)Online publication date: Dec-2018
    • (2017)A novel quality assessment for visual secret sharing schemesEURASIP Journal on Information Security10.1186/s13635-016-0053-02017:1(1-15)Online publication date: 1-Dec-2017
    • (2017)XOR based continuous-tone multi secret sharing for store-and-forward telemedicineMultimedia Tools and Applications10.1007/s11042-016-4012-z76:3(3851-3870)Online publication date: 1-Feb-2017
    • (2015)Analysis and combination of positive aspects of threshold RG based VSS schemes2015 Science and Information Conference (SAI)10.1109/SAI.2015.7237296(1192-1200)Online publication date: Jul-2015
    • (2015)Non-expansible XOR-based visual cryptography scheme with meaningful sharesSignal Processing10.1016/j.sigpro.2014.10.011108:C(604-621)Online publication date: 1-Mar-2015

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media