1
|
YANG CHINGNUNG, CHEN TSESHIH. EXTENDED VISUAL SECRET SHARING SCHEMES: IMPROVING THE SHADOW IMAGE QUALITY. INT J PATTERN RECOGN 2011. [DOI: 10.1142/s0218001407005740] [Citation(s) in RCA: 35] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
Abstract
Visual secret sharing (VSS) scheme is a perfectly secure method to divide a secret image into several noise-like shadow images by splitting a secret pixel into black and white subpixels. Unlike other secret sharing schemes, the VSS scheme can be easily decoded by the human visual sight when staking shadow images. However, noise-like shadows are unusual and suspected by censors when delivered by e-mail or fax. Also, noise-like shadows are difficult to identify and manage when distributed. The problem was solved by adding the extended capability, a meaningful shadow image, in the so-called extended visual secret sharing (EVSS) scheme. In this paper, we present a new EVSS scheme by using gray and white subpixels to represent the secret pixel. Our proposed scheme still has the capability of visually revealing the secret image by stacking shadow images without the help of hardware and complex computation. When compared to the previous EVSS scheme, our new scheme has less number of subpixels to represent a secret pixel and the clearer shadow images.
Collapse
Affiliation(s)
- CHING-NUNG YANG
- Department of Computer Science and Information Engineering, National Dong Hwa University, #1, Da Hsueh Rd, Sec. 2, Haulien 974-01, Taiwan
| | - TSE-SHIH CHEN
- Department of Computer Science and Information Engineering, National Dong Hwa University, #1, Da Hsueh Rd, Sec. 2, Haulien 974-01, Taiwan
| |
Collapse
|
2
|
CHAO KUNYUAN, LIN JACHEN. SECRET IMAGE SHARING: A BOOLEAN-OPERATIONS-BASED APPROACH COMBINING BENEFITS OF POLYNOMIAL-BASED AND FAST APPROACHES. INT J PATTERN RECOGN 2011. [DOI: 10.1142/s0218001409007090] [Citation(s) in RCA: 33] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
Abstract
In secret image sharing, a polynomial interpolation technique heavy experiences a computation load when the secret image is retrieved later. To the contrary, fast approaches often need larger storage space due to pixel expansion property. This paper proposes a missing-allowable (k, n) scheme which is fast and with a reasonable pixel expansion rate (per). The scheme generates n extremely-noisy shadow images for the given secret color image A, and any k out of these n shadows can recover A loss-freely. In average, to decode a color pixel of A, the retrieval uses only three exclusion-OR operations among 24-bit numbers. Hence, the new method has very fast decoding speed, and its pixel expansion rate is always acceptable (0 < per < 2).
Collapse
Affiliation(s)
- KUN-YUAN CHAO
- Department of Computer and Information Science, National Chiao Tung University, 1001 Ta Hsueh Rd., Hsinchu, Taiwan, 300, R.O.C
| | - JA-CHEN LIN
- Department of Computer and Information Science, National Chiao Tung University, 1001 Ta Hsueh Rd., Hsinchu, Taiwan, 300, R.O.C
| |
Collapse
|
3
|
Li JH, Lee WB, Ye D, Liu TJ, Qin C. Adaptive Secret Sharing for Color Images. INT J COMPUT INT SYS 2011. [DOI: 10.1080/18756891.2011.9727831] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/26/2022] Open
|
4
|
Yang CN, Peng AG, Chen TS. Secret Image Sharing: DPVCS A Two-in-One Combination of (D)eterministic and (P)robabilistic (V)isual (C)ryptography (S)chemes. J Imaging Sci Technol 2008. [DOI: 10.2352/j.imagingsci.technol.(2008)52:6(060508)] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/01/2022]
|