Open Access Open Access  Restricted Access Subscription or Fee Access

An Efficient Construction of Extended Visual Sharing Scheme using Error Diffusion

S. Arul Mary, S.T. Veena, P. Swathika, M. Pradhiba Selvarani

Abstract


Visual Cryptography (VC) is a cryptographic technique for encrypting visual information like written materials, textual images, handwritten notes print and scanned images etc. in a perfectly secure way. The information is coded into shares/meaningful shares and distributed. The advantage of this cryptographic technique is that the decryption is performed by the human eye. It also ensures security, in a way that hackers cannot perceive any clues about a secret image from individual shares. Most of the existing color visual cryptography schemes are not  atisfactory in terms of producing either meaningless shares or meaningful shares, leading to suspicion of secret encryption. This paper introduces an efficient extended method of encrypting color visual information into n-color images producing n-meaningful shares of the covert images of high visual quality. This is based on two principles - retaining original pixels and error diffusion. Original pixel retainment synchronizes the positions of pixels that carry visual information throughout the color channels of the color image so that the original pixel values of the visual information are retained even after encryption. This ensures high quality shares that are visually identical to that of originals. Error diffusion is used to construct the shares in
such a way that the noise introduced by the preset pixels are diffused away to neighbors during encryption which results in the shares pleasant to human eyes. The effectiveness of the proposed method is validated using PSNR and WSNR values.


Keywords


Visual Cryptography (VC), Color Meaningful Shares, Original Pixel Retainment, Error Diffusion, Halftoning, Secret Sharing.

Full Text:

PDF

References


Inkoo Kang., Arce G.R., and Heung-Kyu Lee: Color Extened Visual Cryptography using Error Diffusion. In: IEEE Trans on Image Proces., vol. 20.,no. 1(2011)

Naor, M., and Shamir, A. : Visual cryptography . In: Proc.

EUROCRYPT, pp. 1–12(1994).

Naor, M., and Pinkas, B.: Visual authentication and identification. In: Adv.Cryptol., vol. 1294, pp. 322–336(1997).

W. Q. Y, Duo, J., and Kankanhalli, M: Visual cryptography for print and scan applications. In: Proc. IEEE Int. Symp. Circuits Syst., pp. 572–575 (2004)

Ateniese. G, Blundo. C, Santis. A. D., and Stinson D. R.: Visual cryptography for general access structures. In: Inf. Comput., vol. 129,no. 2,pp. 86–106 (1996)

MacPherson, L. A.:Gray level visual cryptography for general access structure. In.: M. Eng. thesis, Univ. Waterloo, Ontario, Canada ( 2000)

Blundo, C., Santis, A. D., and Naor, M: Visual cryptography for grey level images. In: Inf. Process. Lett., vol. 75, no. 6, pp. 255–259,(2000)

Hsu, Y. T., and Chang, L. W:A new construction algorithm of visual crytography for gray level images. In: Proc. IEEE Int. Symp. Circuits Syst., pp. 1430–1433(2006)

Lin, C. C., and Tsai, W. H: Visual cryptography for gray-level images by dithering techniques: in Pattern Recognit. Lett., vol. 24, pp. 349–358 (2003)

Koga, H., and Yamamoto, H: Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images. In: IEICE Trans.Fundamentals, vol. E81-A, no. 6, pp. 1262–1269(1998)

Rijimen, V., and Preneel, B:Efficient color visual encryption for shared colors of Benetton: presented at the Proc. Eurocrypto Rump Session(1996)

Hou, Y. C:Visual cryptography for color images. In : Pattern Recognit., vol. 36, pp. 1619–1629, (2003)

Ateniese, G., Blundo, C., Santis, A., and Stinson, D. R: Extended capabilities for visual cryptography. In : ACM Theor. Comput. Sci., vol.250, pp. 143–161 (2001)

Wang, D. S., Yi, F., and Li X: On general consturction for extended visual cryptography schemes. In: Pattern Recognit., pp. 3071–3082 (2009)

Nakajima, M., and Yamaguchi, Y: Extended visual cryptography for natural images. In: J. WSCG, vol. 10, no. 2 (2002)

Myodo, E., Sakazawa, S., and Takishima, Y: Visual cryptography based on void-and-cluster halftoning technique. In: Proc. IEEE Int. Conf. Image Process., pp. 97–100(2006)

Droste, S: New results on visual cryptography. In: Proc. 16th Annu.Int. Cryptol. Conf. Adv. Cryptol., London, UK, pp. 401–415(1996)

Lukac, R., and Plataniotis, K. N: Colour image secret sharing. In:Electron. Lett., vol. 40, no. 9, pp. 529–531(2004)

Yang, C. N., and Chen, T. S: Visual cryptography scheme based onadditive color mixing. In: Pattern Recognit., vol. 41, pp. 3114–3129 (2008)

Zhou Z., Arce G. R., and Crescenzo G. D., “Halftone visual cryptography,” IEEE Trans. Image Process., vol. 18, no. 8, pp. 2441–2453,Aug. 2006

Wang Z. M., Arce G. R., and Di Crescenzo G., “Halftone visual cryptography via error diffusion,” IEEE Trans. Inf. Forensics Security,vol. 4, no. 3, pp. 383–396, Sep. 2009

W.Q. Y, Duo J., and Kankanhalli M., “Visual cryptography for print and scan applications,” in Proc. IEEE Int. Symp. Circuits Syst., 2004, pp.572–578

Ulichney R. A., “Dithering with blue noise,” Proc. IEEE, vol. 76, no. 1,pp. 56–79, Jan. 1988

Naor M. and Shamir A., “Visual cryptography II: Improving the contrast via the cover base,” Lect. Notes Comput. Sci., vol. 1189,pp.197–202, 1997

Fu M.S. and Au O.C., ”Joint visual Cryptography and watermarking,” in Proc. IEEE Int. Conf. Multimedia Expo,2004, pp. 975-978

Yang C.N, “A Note on efficient color visual encryption,” J. Inf. Sci.Eng., vol. 18, pp. 367-372, 2002

Shyu .S.J, “Efficient visual secret sharing scheme for color images,”Pattern Recognit., vol. 39, no. 5, pp. 866-880, May 2006.

Lau D.L., Arce G.R, and N.C. Gallagher, ”Digital halftoning by means of green-noise masks,” J. opt. Soc. Amer. A, Vol. 16,no 7,pp-1575- 1586, Jul.1999

Kim S.H. and Allebach J.P, “Impact of hvs models on model-based halftoning,” IEEE Trans. Imag Process., vol. 11, no. 3,pp. 258-269, Mar.2002

Hsu C.S. and Hou Y.C, “Copyright protection scheme for digital images using visual cryptography and sampling methods,” Opt. Eng.,Vol. 44,p.077003, 2005


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.