Abstract
Two of the main areas of research in visual cryptography have been on improving the visual quality of the recovered image and in reducing the pixel expansion of the shares. This paper addresses both of these visual cryptography issues. First, a method to enhance the perceived visual quality of the recovered image using various image filtering techniques is presented. In particular, these image filtering techniques are used to enhance the local and global contrasts of a grayscale image. Second, a multi-pixel block size invariant visual cryptography scheme that maintains the relative density of local neighboring pixels is proposed. This method encrypts blocks of pixels based on whether the total number of black pixels within the respective blocks is above or below a certain threshold. In conjunction, these approaches effectively improve on the perceived visual quality of a recovered visual cryptography image.
Chapter PDF
Similar content being viewed by others
References
Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)
Chen, Y.-F., Chan, Y.-K., Huang, C.-C., Tsai, M.-H., Chu, Y.-P.: A multiple-level visual secret-sharing scheme without image size expansion. Inf. Sci. 177(21), 4696–4710 (2007)
Cimato, S., Prisco, R.D., Santis, A.D.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2006)
Cimato, S., Yang, C.: Visual cryptography and secret image sharing. Digital Imaging and Computer Vision Series. Taylor & Francis (2011)
Floyd, R.W., Steinberg, L.: An adaptive algorithm for spatial greyscale. Proceedings of the Society of Information Display 17, 75–77 (1976)
Hou, Y.-C., Tu, S.-F.: A visual cryptographic technicque for chromatic images using multi-pixel encoding method. Journal of Research and Practice in Information Technology 37(2) (2005)
Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 82(10), 2172–2177 (1999)
Leung, B.W., Ng, F.Y., Wong, D.S.: On the security of a visual cryptography scheme for color images. Pattern Recognition 42(5), 929–940 (2009)
Lin, C.-C., Tsai, W.-H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters 24(1-3), 349–358 (2003)
Liu, F., Guo, T., Wu, C.K., Qian, L.: Improving the visual quality of size invariant visual cryptography scheme. J. Visual Communication and Image Representation 23(2), 331–342 (2012)
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Shyu, S.J.: Image encryption by random grids. Pattern Recognition 40(3), 1014–1031 (2007)
Wu, X., Wong, D.S., Li, Q.: Threshold visual cryptography scheme for color images with no pixel expansion. In: Proceedings of the Second Symposium International Computer Science and Computation Technology, pp. 310–315 (2009)
Yang, C.-N.: New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25(4), 481–494 (2004)
Yang, C.-N., Chen, T.-S.: Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions. In: Campilho, A.C., Kamel, M.S. (eds.) ICIAR 2006. LNCS, vol. 4141, pp. 468–479. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chow, YW., Susilo, W., Wong, D.S. (2012). Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme. In: Chim, T.W., Yuen, T.H. (eds) Information and Communications Security. ICICS 2012. Lecture Notes in Computer Science, vol 7618. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34129-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-34129-8_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34128-1
Online ISBN: 978-3-642-34129-8
eBook Packages: Computer ScienceComputer Science (R0)