Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Threshold progressive visual cryptography construction with unexpanded shares

Published: 01 July 2016 Publication History

Abstract

Differently from traditional secret sharing, progressive secret sharing can gain clearer recovered secret image with more shares. However, previous progressive visual secret sharing (PVSS) schemes with unexpanded shares are only for case (2, n) other than general threshold (case), which will restrict the application range. In this paper, a general threshold PVSS construction method from case (2, n) with unexpanded shares is proposed. It has the feature of (k, n) threshold with no pixel expansion, which could be loss-tolerant and control access for a wider application. Based on the proposed construction method, a new threshold PVSS scheme is constructed. Compared with relative approaches, the proposed scheme has improved performances.

References

[1]
Chen S-K (2009) Friendly progressive visual secret sharing using generalized random grids. Optical Eng 48(11):117001-1---117001-7
[2]
Chen T-H, Tsao K-H (2011) Threshold visual secret sharing by random grids. J Syst Software 84:1197---1208
[3]
Chen T-H et al (2013) Quality-adaptive visual secret sharing by random grids. J Syst Softw 86(5):1267---1274
[4]
Fang W-P, Lin J-C (2006) Progressive viewing and sharing of sensitive images. Pattern Recog Image Analysis 16(4):632---636
[5]
Guo T, Liu F, Wu CK (2013) Threshold visual secret sharing by random grids with improved contrast. J Syst Software 86(8):2094---2109
[6]
Hou Y-C (2003) Visual cryptography for color images. Pattern Recogn 36(7):1619---1629
[7]
Hou Y-C, Quan Z-Y (2011) Progressive visual cryptography with unexpanded shares. IEEE Trans on Circ and Sys for Video Tech 21(11):1760---1764
[8]
Hou Y-C, Quan Z-Y, Tsai C-F (2013) Block-based progressive visual secret sharing. Inf Sci 233:290---304
[9]
Jin D, Yan W-Q, Mohan S (2005) Kankanhalli, Progressive color visual cryptography. SPIE J Electron Imaging 14(3)
[10]
Naor, Moni, and Adi Shamir (1995) Visual cryptography, in Advances in Cryptography, Eurocrypt'94, pp. 1---12
[11]
Shyu SJ (2007) Image encryption by random grids. Patt Recog 40.3:1014---1031
[12]
Shyu SJ (2009) Image encryption by multiple random grids. Patt Recog 42:1582---1596
[13]
Wang Z, Arce GR, Di G (2009) Crescenzo. Halftone visual cryptography via error diffusion IEEE Trans Inf Forensics Security 4(3):383---396
[14]
Wang D, Zhanga L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations {J}. Pattern Recogn 40(10):2776---2785
[15]
Weir J, Yan WQ (2010) A comprehensive study of visual cryptography, Transactions on DHMS V. LNCS 6010:70---105
[16]
Wu X (2013) Wei Sun, Random grid-based visual secret sharing with abilities of OR and XOR decryptions. J Vis Commun Image R 24:48---62
[17]
Wu X, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93(5):977---995
[18]
Yan X, Shen W, Abd El-Latif AA, Niu X (2014) A novel perceptual secret sharing scheme. Trans Data Hiding Multimedia Secur IX Lect Notes Comp Sci 8363:68---90
[19]
Yan X, Wang S, El-Latif AAA et al. (2013) Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery{J}. Multimedia Tools and Applications :1---22
[20]
Yang C-N (2004) New visual secret sharing schemes using probabilistic method {J}. Pattern Recogn Lett 25(4):481---494

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Multimedia Tools and Applications
Multimedia Tools and Applications  Volume 75, Issue 14
July 2016
691 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 July 2016

Author Tags

  1. Pixel expansion
  2. Progressive visual cryptography
  3. Progressive visual secret sharing
  4. Quality-adaptive
  5. Threshold
  6. Visual secret sharing

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)A novel perfect contrast XOR-based visual cryptography scheme for multiple secretsMultimedia Tools and Applications10.1007/s11042-022-13187-281:30(43125-43143)Online publication date: 1-Dec-2022
  • (2020)Efficient collusion resistant multi-secret image sharingMultimedia Tools and Applications10.1007/s11042-020-09619-679:43-44(33233-33252)Online publication date: 1-Nov-2020
  • (2020)Quality improved (k, n) priority based progressive visual secret sharingMultimedia Tools and Applications10.1007/s11042-019-08319-079:17-18(11459-11486)Online publication date: 1-May-2020
  • (2019)Threshold changeable secret image sharing scheme based on interpolation polynomialMultimedia Tools and Applications10.1007/s11042-019-7205-478:13(18653-18667)Online publication date: 1-Jul-2019
  • (2018)Random grid-based threshold visual secret sharing with improved visual quality and lossless recovery abilityMultimedia Tools and Applications10.1007/s11042-017-5482-377:16(20673-20696)Online publication date: 1-Aug-2018

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media