Abstract
In visual cryptography, random shares are generated from a binary secret image whereas in extended visual cryptography, meaningful shares are generated using the scheme. There are lots of constructions in visual cryptography and extended visual cryptography for both general and special access structures. Here in this paper, we are proposing an extended visual cryptographic scheme with improved contrast and less pixel expansion for the special access structures (t, k, n) and \( \left( {\frac{n}{2} + 1,n} \right) \) where each participant hold single meaningful image as share. The cover images used for creating shares in the proposed schemes are complementary in nature.
Similar content being viewed by others
References
Naor, M., Shamir, A.: Visual cryptography. In: EUROCRYPT. Lecture Notes in Computer Science. Springer, Heidelberg, vol. 950, pp. 1–12 (1994)
Ateniese, G., Blundo, C., DeSantis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)
Adhikari, A.: Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images. Des. Codes Cryptogr. 73(3), 865–895 (2013)
Blundo, C., Bonis, A.D., Santis, A.D.: Improved schemes for visual cryptography. Des. Codes Cryptogr. 24(3), 255–278 (2001)
Arumugam, S., Lakshmanan, R., Nagar, A.K.: On (k, n)*-visual cryptography scheme. Des. Codes Cryptogr. 71(1), 153–162 (2014)
Guo, T., Liu, F., Wu, C.K., et al.: On (k, n) visual cryptography scheme with t essential parties. In: LNCS, vol. 8317, pp. 56–68 (2014)
Dutta, S., Rohit, R.S., Adhikari, A.: Constructions and analysis of some efficient t - (k, n)- visual cryptographic schemes using linear algebraic techniques. Des. Codes Cryptogr. 80(1), 165–196 (2016)
Praveen, K., Rajeev, K., Sethumadhavan, M.: On the extensions of (k, n)*-visual cryptographic schemes. In: International Conference on Security in Computer Networks and Distributed Systems, pp. 231–238 (2014)
Praveen, K., Sethumadhavan, M., Krishnan, R.: Visual cryptographic schemes using combined Boolean operations. Journal of Discrete Mathematical Sciences and Cryptography 20(2), 413–437 (2017)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1), 143–161 (2001)
Liu, F., Wu, C.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Sec. 6(2), 307–322 (2011)
Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans Image Process. 15(8), 2441–2453 (2006)
Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography with error diffusion. IEEE Trans. Inf. Forensics Sec. 4(3), 383–396 (2009)
Wang, D.S., Yi, F., Li, X.B.: On general constructions for extended visual cryptographic schemes. Pattern Recogn. 42, 3071–3082 (2009)
Yang, C.N., Yang, Y.Y.: New extended visual cryptography schemes with clearer shadow images. Inf. Sci. 271, 246–263 (2014)
Yan, X., Wang, S., Niu, X., Yang, C.N.: Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Dig. Signal Process. 38, 53–65 (2015)
Lu, S., Manchala, D., Ostrovsky, R.: Visual cryptography on graphs. J. Combin. Optim. 21(1), 47–66 (2011)
Lee, K.H., Chiu, P.L.: An extended visual cryptography algorithm for general access structures. IEEE Trans. Inf. Forensics Sec. 7(1), 219–229 (2012)
Guo, T., Liu, F., Wu, C.K.: k out of k extended visual cryptographic scheme by random grids. Signal Process. 94, 90–101 (2014)
Chiu, P.L., Lee, K.H.: User-friendly threshold visual cryptography with complementary cover images. Signal process. 108, 476–488 (2015)
Ou, D., Sun, W., Wu, X.: Non-expansible XOR-based visual cryptography scheme with meaningful shares. Signal Process. 108, 604–621 (2015)
Yan, X., Wang, S., Niu, X., Yang, C.N.: Generalized random grids-based threshold visual cryptography with meaningful shares. Signal Process. 109, 317–333 (2015)
Wang, S., Yan, X., Sang, J., Niu, X.: Meaningful visual secret sharing based on error diffusion and random grids. Multimed. Tools Appl. 75(6), 3353–3373 (2016)
Yan, B., Wang, Y.F., Song, L.Y., Yang, H.M.: Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimed. Tools Appl. 75(18), 11157–11180 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Praveen, K., Indhu, G., Sethumadhavan, M. (2018). OR Operation Based Deterministic Extended Visual Cryptography Using Complementary Cover Images. In: Thampi, S., Mitra, S., Mukhopadhyay, J., Li, KC., James, A., Berretti, S. (eds) Intelligent Systems Technologies and Applications. ISTA 2017. Advances in Intelligent Systems and Computing, vol 683. Springer, Cham. https://doi.org/10.1007/978-3-319-68385-0_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-68385-0_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68384-3
Online ISBN: 978-3-319-68385-0
eBook Packages: EngineeringEngineering (R0)