Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2108616.2108635acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing

Published: 14 January 2010 Publication History

Abstract

Visual secret sharing (VSS) schemes have been proposed by Naor and Shamir [1] in 1995. It encodes a binary secret image into several meaningless images called shares or transparencies. The secret image can be obtained by stacking the qualified set of shares without any complex computation. This paper proposed a (k, n) VSS scheme which encodes a secret into n meaningful shares, and these shares can be grayscale or color images. People gather k or more shares can recover the secret information by stacking these shares together, but nothing when number of shares less than k. The scheme improves Tsai et al.'s scheme [2] which provided lower quality of recovered secret. Experimental results show that our scheme provides higher visual quality of shares and recovered secrets.

References

[1]
Naor, M. and Shamir, A. 1995. Visual cryptography. Advance in Cryptology: Eurpocrypt'94, Lecture Notes In Computer Science, Springer Verlag, Germany, vol. 950, pp. 1--12.
[2]
Tsai, D. S., Chen, T., and Horng, G. 2008. On generating meaningful shares in visual secret sharing scheme. The Imaging Science Journal, vol. 56, no. 1, pp. 49--55.
[3]
Thien, C. C. and Lin, J. C. 2002. Secret image sharing. Computers & Graphics, vol. 26, no. 5, pp. 765--770.
[4]
Chang, C. C., Lin, C. C., Lin, C. H., and Chen, Y. H. 2008. A novel secret image sharing scheme in color images using small shadow images. Information sciences, vol. 178, no. 11, pp. 2433--2447.
[5]
Fang, W. P. 2007. Quality controllable progressive secret image sharing -- discrete cosine transform approach. International Journal of Education and Information Technologies, vol. 1, no. 1, pp. 43--47.
[6]
Zhao, R., Zhao, J. J., Dai, F., and Zhao, F. Q. 2009. A new image secret sharing scheme to identify cheaters. Computer Standards & Interfaces, vol. 31, no. 1, pp. 252--257.
[7]
Sirhindi, R., Afzal, M., and Murtaza, S. 2008. An extended secret sharing scheme for color images with fixed pixel expansion. International Journal of Electronic Security and Digital Forensics, vol. 2, no. 1, pp. 58--67.
[8]
Nakajima, M. and Yamaguchi, Y. 2002. Extended visual cryptography for natural images. Journal of WSCG, vol. 10, no. 2, pp. 303--310.
[9]
Yue, T. W. and Chiang, S. 2004. A neural-network approach for visual cryptography and authorization. International Journal of Neural System, vol. 14, no. 3, pp. 175--187
[10]
Wang, Z., Arce, G. R., and Di Crescenzo, G. 2009. Halftone visual cryptography via error diffusion. IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 383--396.
[11]
Yang, C. N. and Chen, T. S. 2007. Extended visual secret sharing schemes: improving the shadow image quality. International Journal of Pattern Recognition, vol. 21, no. 5, pp. 879--898.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
January 2010
550 pages
ISBN:9781605588933
DOI:10.1145/2108616
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 January 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. meaningful shares
  2. visual cryptography
  3. visual secret sharing

Qualifiers

  • Research-article

Funding Sources

Conference

ICUIMC '10
Sponsor:

Acceptance Rates

Overall Acceptance Rate 251 of 941 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media