http://iet.metastore.ingenta.com
1887

User-friendly XOR-based visual secret sharing by random grid

User-friendly XOR-based visual secret sharing by random grid

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This study proposes a user-friendly XOR-based visual secret sharing scheme using random grids. In some visual secret sharing schemes, problems such as pixel expansion or noisy and meaningless shares may be encountered. In the proposed scheme, different regions in the shared image will have different brightness levels depending on the cover image's pixel values so that the generated shares contain information regarding the cover image and are not just a meaningless noisy image. This can overcome the difficulty in recovering the secret image in cases wherein the shares were mixed up by mistake. Furthermore, the dimension of the share is the same as the secret image and there are no pixel expansion problems. The size of the recovered secret image is consistent with the size of the original secret image, and there are no changes in scaling. Lastly, although one of the generated share is a complementary cover image, the image quality of the recovered secret image is still favourable when the secret image is recovered. The experimental and analysis results demonstrate that the proposed scheme is more effective than other schemes.

References

    1. 1)
      • 1. Shyu, S.J.: ‘Visual cryptograms of random grids for threshold access structures’, Theor. Comput. Sci., 2015, 565, pp. 3049.
    2. 2)
      • 2. Naor, M., Shamir, A.: ‘Visual cryptography’, in De Santis, A. (Eds.): Advances in Cryptology: EUROCRYPT’94, (LNCS, Springer, Berlin, Heidelberg, 1995, 950, pp. 112.
    3. 3)
      • 3. Wu, X., Sun, W.: ‘Visual secret sharing for general access structures by random grids’, IET Inf. Secur., 2012, 6, (4), pp. 299309.
    4. 4)
      • 4. Yang, C.N., Liao, J.K., Wang, D.S.: ‘New privilege-based visual cryptography with arbitrary privilege levels’, J. Vis. Commun. Image Represent., 2017, 42, pp. 121131.
    5. 5)
      • 5. Chao, H.C., Fan, T.Y.: ‘Generating random grid-based visual secret sharing with multi-level encoding’, Signal Process Image Commun., 2017, 57, pp. 6067.
    6. 6)
      • 6. Chao, H.C., Fan, T.Y.: ‘Priority visual secret sharing of random grids for threshold access structures’, Multimed. Tools Appl., 2018, 77, (10), pp. 1186711882.
    7. 7)
      • 7. Fan, T.Y., Chieu, B.C., Chao, H.C.: ‘Robust copyright-protection scheme based on visual secret sharing and Bose–Chaudhuri–Hocquenghem code techniques’, J. Electron. Imaging, 2012, 21, (4), p. 043018.
    8. 8)
      • 8. Ciptasari, R.W., Rhee, K.H., Sakurai, K.: ‘An enhanced audio ownership protection scheme based on visual cryptography’, EURASIP J. Inf. Secur., 2014, 2014, (2), pp. 112.
    9. 9)
      • 9. Naor, M., Pinka, B.: ‘Visual authentication and identification’. in Kaliski, B.S. (Eds.): Advances in Cryptology-CRYPTO97, (LNCS, Springer, Berlin, Heidelberg, 2006), 1294, pp. 322336.
    10. 10)
      • 10. Shyu, S.J., Chen, M.C.: ‘Optimum pixel expansions for threshold visual secret sharing schemes’, IEEE Trans. Inf. Forensics Secur., 2011, 6, (3), pp. 9609969.
    11. 11)
      • 11. Shivani, S., Agarwal, S.: ‘Novel basis matrix creation and preprocessing algorithms for friendly progressive visual secret sharing with space-efficient shares’, Multimed. Tools Appl., 2017, 76, (6), pp. 87118744.
    12. 12)
      • 12. Ateniese, G., Blundo, C., De Santis, A., et al: ‘Extended schemes for visual cryptography’, Theor. Comput. Sci., 2000, 250, (1–2), pp. 143161.
    13. 13)
      • 13. Zhou, Z., Arce, G., Di Crescenzo, G.: ‘Halftone visual cryptography’, IEEE Trans. Image Process., 2006, 15, (8), pp. 24412453.
    14. 14)
      • 14. Shyu, S.J.: ‘Threshold visual cryptographic scheme with meaningful shares’, IEEE Signal Process. Lett., 2014, 21, (12), pp. 15211525.
    15. 15)
      • 15. Kafri, O., Keren, E.: ‘Encryption of pictures and shapes by random grids’, Opt. Lett., 1987, 12, (6), pp. 377379.
    16. 16)
      • 16. Shyu, S.J.: ‘Image encryption by random grids’, Pattern Recognit., 2007, 40, (3), pp. 10141031.
    17. 17)
      • 17. Shyu, S.J.: ‘Image encryption by multiple random grids’, Pattern Recognit., 2009, 42, (7), pp. 15821596.
    18. 18)
      • 18. Chen, T.H., Tsao, K.H.: ‘Threshold visual secret sharing by random grids’, J. Syst. Softw., 2011, 84, (7), pp. 11971208.
    19. 19)
      • 19. Chiu, P.L., Lee, K.H.: ‘User-friendly threshold visual cryptography with complementary cover images’, Signal Process., 2015, 108, pp. 476488.
    20. 20)
      • 20. Chao, H.C., Fan, T.Y.: ‘Random-grid based progressive visual secret sharing scheme with adaptive priority’, Digit. Signal Process., 2017, 68, pp. 6980.
    21. 21)
      • 21. Chen, T.H., Tsao, K.H.: ‘User-friendly random-grid-based visual secret sharing’, IEEE Trans. Circuits Syst. Video Technol., 2011, 21, (11), pp. 16931703.
    22. 22)
      • 22. Hou, Y.C., Wei, S.C., Lin, C.Y., et al: ‘Random-grid-based visual cryptography schemes’, IEEE Trans. Circuits Syst. Video Technol., 2014, 24, (5), pp. 733744.
    23. 23)
      • 23. Wu, X., Sun, W.: ‘Generalized random grid and its applications in visual cryptography’, IEEE Trans. Inf. Forensics Secur., 2013, 8, (9), pp. 15411553.
    24. 24)
      • 24. Ito, R., Kuwakado, H., Tanaka, H.: ‘Image size invariant visual cryptography’, IEICE Trans. Fund. Electron. Commun. Comput. Sci., 1999, E82–A, (10), pp. 21722177.
    25. 25)
      • 25. Hou, Y.C., Quan, Z.Y., Tsai, C.F.: ‘A privilege-based visual secret sharing model’, J. Vis. Commun. Image Represent., 2015, 33, pp. 358367.
    26. 26)
      • 26. Yang, C.N.: ‘New visual secret sharing schemes using probabilistic method’, Pattern Recogn. Lett., 2004, 25, pp. 481494.
    27. 27)
      • 27. Cimato, S., De Prisco, R., De Santis, A.: ‘Probabilistic visual cryptography schemes’, Comput. J., 2006, 49, pp. 97107.
    28. 28)
      • 28. De Prisco, R., De Santis, A.: ‘On the relation of random grid and deterministic visual cryptography’, IEEE Trans. Inf. Forensics Secur., 2014, 9, (4), pp. 653665.
    29. 29)
      • 29. Yang, C.N., Wu, C.C., Wang, D.S.: ‘On the relation of probabilistic visual cryptography and random grid’, Inf. Sci., 2014, 278, pp. 141173.
    30. 30)
      • 30. Brindha, K., Jeyanthi, N.: ‘Secured document sharing using visual cryptography in cloud data storage’, Cybern. Inf. Technol., 2015, 15, (4), pp. 111123.
    31. 31)
      • 31. Singh, P., Raman, B.: ‘Reversible data hiding based on Shamir's secret sharing for color images over cloud’, Inf. Sci., 2018, 422, pp. 7797.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2017.0546
Loading

Related content

content/journals/10.1049/iet-ifs.2017.0546
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address