Nothing Special   »   [go: up one dir, main page]

Skip to main content

OR Operation Based Deterministic Extended Visual Cryptography Using Complementary Cover Images

  • Conference paper
  • First Online:
Intelligent Systems Technologies and Applications (ISTA 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 683))

  • 1016 Accesses

Abstract

In visual cryptography, random shares are generated from a binary secret image whereas in extended visual cryptography, meaningful shares are generated using the scheme. There are lots of constructions in visual cryptography and extended visual cryptography for both general and special access structures. Here in this paper, we are proposing an extended visual cryptographic scheme with improved contrast and less pixel expansion for the special access structures (t, k, n) and \( \left( {\frac{n}{2} + 1,n} \right) \) where each participant hold single meaningful image as share. The cover images used for creating shares in the proposed schemes are complementary in nature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: EUROCRYPT. Lecture Notes in Computer Science. Springer, Heidelberg, vol. 950, pp. 1–12 (1994)

    Google Scholar 

  2. Ateniese, G., Blundo, C., DeSantis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  3. Adhikari, A.: Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images. Des. Codes Cryptogr. 73(3), 865–895 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  4. Blundo, C., Bonis, A.D., Santis, A.D.: Improved schemes for visual cryptography. Des. Codes Cryptogr. 24(3), 255–278 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  5. Arumugam, S., Lakshmanan, R., Nagar, A.K.: On (k, n)*-visual cryptography scheme. Des. Codes Cryptogr. 71(1), 153–162 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  6. Guo, T., Liu, F., Wu, C.K., et al.: On (k, n) visual cryptography scheme with t essential parties. In: LNCS, vol. 8317, pp. 56–68 (2014)

    Google Scholar 

  7. Dutta, S., Rohit, R.S., Adhikari, A.: Constructions and analysis of some efficient t - (k, n)- visual cryptographic schemes using linear algebraic techniques. Des. Codes Cryptogr. 80(1), 165–196 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  8. Praveen, K., Rajeev, K., Sethumadhavan, M.: On the extensions of (k, n)*-visual cryptographic schemes. In: International Conference on Security in Computer Networks and Distributed Systems, pp. 231–238 (2014)

    Google Scholar 

  9. Praveen, K., Sethumadhavan, M., Krishnan, R.: Visual cryptographic schemes using combined Boolean operations. Journal of Discrete Mathematical Sciences and Cryptography 20(2), 413–437 (2017)

    Article  MathSciNet  Google Scholar 

  10. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1), 143–161 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  11. Liu, F., Wu, C.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Sec. 6(2), 307–322 (2011)

    Article  Google Scholar 

  12. Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans Image Process. 15(8), 2441–2453 (2006)

    Article  Google Scholar 

  13. Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography with error diffusion. IEEE Trans. Inf. Forensics Sec. 4(3), 383–396 (2009)

    Article  MATH  Google Scholar 

  14. Wang, D.S., Yi, F., Li, X.B.: On general constructions for extended visual cryptographic schemes. Pattern Recogn. 42, 3071–3082 (2009)

    Article  MATH  Google Scholar 

  15. Yang, C.N., Yang, Y.Y.: New extended visual cryptography schemes with clearer shadow images. Inf. Sci. 271, 246–263 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  16. Yan, X., Wang, S., Niu, X., Yang, C.N.: Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Dig. Signal Process. 38, 53–65 (2015)

    Article  Google Scholar 

  17. Lu, S., Manchala, D., Ostrovsky, R.: Visual cryptography on graphs. J. Combin. Optim. 21(1), 47–66 (2011)

    Article  MATH  Google Scholar 

  18. Lee, K.H., Chiu, P.L.: An extended visual cryptography algorithm for general access structures. IEEE Trans. Inf. Forensics Sec. 7(1), 219–229 (2012)

    Article  Google Scholar 

  19. Guo, T., Liu, F., Wu, C.K.: k out of k extended visual cryptographic scheme by random grids. Signal Process. 94, 90–101 (2014)

    Article  Google Scholar 

  20. Chiu, P.L., Lee, K.H.: User-friendly threshold visual cryptography with complementary cover images. Signal process. 108, 476–488 (2015)

    Article  Google Scholar 

  21. Ou, D., Sun, W., Wu, X.: Non-expansible XOR-based visual cryptography scheme with meaningful shares. Signal Process. 108, 604–621 (2015)

    Article  Google Scholar 

  22. Yan, X., Wang, S., Niu, X., Yang, C.N.: Generalized random grids-based threshold visual cryptography with meaningful shares. Signal Process. 109, 317–333 (2015)

    Article  Google Scholar 

  23. Wang, S., Yan, X., Sang, J., Niu, X.: Meaningful visual secret sharing based on error diffusion and random grids. Multimed. Tools Appl. 75(6), 3353–3373 (2016)

    Article  Google Scholar 

  24. Yan, B., Wang, Y.F., Song, L.Y., Yang, H.M.: Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimed. Tools Appl. 75(18), 11157–11180 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Praveen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Praveen, K., Indhu, G., Sethumadhavan, M. (2018). OR Operation Based Deterministic Extended Visual Cryptography Using Complementary Cover Images. In: Thampi, S., Mitra, S., Mukhopadhyay, J., Li, KC., James, A., Berretti, S. (eds) Intelligent Systems Technologies and Applications. ISTA 2017. Advances in Intelligent Systems and Computing, vol 683. Springer, Cham. https://doi.org/10.1007/978-3-319-68385-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68385-0_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68384-3

  • Online ISBN: 978-3-319-68385-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics