Abstract
By the addition of halftone techniques, halftone visual cryptography scheme (HVCS) embeds a secret image into halftone shares taking meaningful visual information. In this paper, we propose a (k, n)-HVCS using complementary cover images. Before the halftone processing of the cover images by error diffusion, secret information pixels (SIPs) are prefixed based on the underlying (k, n)-VCS. In the halftone processing, several pairs of complementary cover images are adopted and two halftone methods on the cover images are designed for different (k, n) threshold access structures. The proposed scheme removes the share’s cross interference from other shares and obtains better visual quality. Furthermore, the proposed scheme eliminates the burden that each participant may carry multiple shares.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. ACM Theor. Comput. Sci. 250, 143–161 (2001)
Droste, S.: New results on visual cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401–415. Springer, Heidelberg (1996). doi:10.1007/3-540-68697-5_30
Liu, F., Wu, C.K.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6, 307–322 (2011)
Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. In: WSCG 2002, pp. 303–412. CSRN, Plzen (2002)
Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). doi:10.1007/BFb0053419
Tsai, D.S., Chen, T., Horng, G.: On generating meaningful shares in visual secret sharing scheme. Imaging Sci. J. 56, 49–55 (2008)
Ulichney, R.A.: The void-and-cluster method for dither array generation. In: Human Vision, Visual Processing, and Digital Display IV, San Jose, CA, vol. 1913, pp. 332–343. SPIE (1993)
Wang, D.S., Yi, F., Li, X.: On general construction for extended visual cryptography schemes. Pattern Recogn. 42, 3071–3082 (2009)
Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4, 383–396 (2009)
Yan, X.H., Shen, W., Niu, X.M., Yang, C.N.: Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Digital Sig. Process. 38, 53–65 (2015)
Yang, C.N., Yang, Y.Y.: New extended visual cryptography schemes with clearer shadow images. Inf. Sci. 271, 246–263 (2014)
Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15, 2441–2453 (2006)
Acknowledgments
We would like to thank the anonymous reviewers for their important and helpful comments. This work was supported by the National Natural Science Foundation of China with No. 61602513 and No. 61671448, the Strategic Priority Research Program of the Chinese Academy of Sciences with No. XDA06010701, and the National Key R&D Program of China with No. 2016YFB0800100.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Shen, G., Liu, F., Fu, Z., Yu, B., Wang, W. (2017). Halftone Visual Cryptography with Complementary Cover Images. In: Shi, Y., Kim, H., Perez-Gonzalez, F., Liu, F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science(), vol 10082. Springer, Cham. https://doi.org/10.1007/978-3-319-53465-7_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-53465-7_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-53464-0
Online ISBN: 978-3-319-53465-7
eBook Packages: Computer ScienceComputer Science (R0)