Abstract
Visual Cryptography Scheme (VCS) is a cryptographic technique which can hide image based secrets. Even though VCS has the major advantage that the decoding can be done with the help of Human Visual System (HVS), yet it does not provide sufficient reconstruction quality. Hence, Two in One Image Secret Sharing Scheme (TiOISSS) is used which provides two decoding phases. However, the existing TiOISSS method has several limitations. In this work, a Modified TiOISSS is proposed in which an adaptive threshold is used for halftoning, which changes depending on the nature of the pixels present in image. By this, the quality of reconstructed secret image is improved in the first decoding stage compared to the existing scheme. In addition, the security is also enhanced by pixel and bit level permutation with a 64 bit key and embedding the key in Gray VCS shadows. To verify the authenticity of the image, a secret message is also embedded in the shadows. Security analysis shows that the Modified TiOISSS is robust to Brute Force and Man-in-Middle attacks.
Similar content being viewed by others
References
Arumugam S, Lakshmanan R, Nagar AK (2014) On (k, n) visual cryptography scheme. J Des Codes Crypt 71(1):153–162
Arya KV, Rishiwal V, Yadav AK (2014) An efficient halftone visual secret sharing scheme, Proceedings of 9th International Conference on Industrial and Information Systems (ICIIS), 2014
Askari N, Heys HM, Moloney CR (2013) An extended visual cryptography scheme without pixel expansion for halftone images, Proceedings of 26th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2013
Chen T-H, Tsao K-H (2011) User-friendly random-grid-based visual secret sharing. IEEE Trans Circ Syst Video Technol 21(11):1693–1703
Guo T, Liu F, Wu CK (2013) Threshold visual secret sharing by random grids with improved contrast. J Syst Softw 86(8):2094–2109
Lee C-C, Chen H-H, Liu H-T, Chen G-W, Tsai C-S (2014) A new visual cryptography with multi-level encoding. J Vis Lang Comput 25(3):243–250
Leng L, Beng A, Jin T (2015) Alignment-free row-co-occurrence cancelable palmprint Fuzzy vault. Pattern Recogn 48(7):2290–2303
Lia P, Maa P-J, Sua X-H, Yang C-N (2012) Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J Vis Commun Image Represent 23(3):441–453
Lin S-J, Lin J-C (2007) VCPSS:A two-in-one two-decoding options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. J Pattern Recognit Lett 40(12):3652–3666
Lin C-C, Tsai W-H (2002) Visual cryptography for gray-level images by dithering techniques. J Pattern Recognit Lett 24(4):349–358
Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y- H, Ray-Shine R, Jui-Lin L, Rong-Jian C (2010) Novel multiple secret sharing. J Expert Syst Appl 37(12):7858–7869
Liu F, Yan WQ, Li P, Wu C (2014) ESSVCS: an enriched secret sharing visual cryptography. Trans Data Hiding Multimed Secur IX 8363:1–24
Naor M, Shamir A (1994) Visual cryptography, Alfredo De Santis (ed), Advances in cryptology proceedings of Eurocypto’94, lecture notes in computer science, vol. 950, pp. 1–12
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Thien C-C, Lin J-C (2002) Secret image sharing. J Comput Graph 26(5):765–770
Wang D, Yi F, Li X (2009) On general construction for extended visual cryptography schemes. J Pattern Recognit 42(11):3071–3082
Wang Y, Wong K-W, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. J Appl Soft Comput 11:514–522
Wu H-C, Chan C-C (2005) Sharing visual multi-secrets using circle shares. J Comput Stand Interfaces 28(1):123–135
Yang C-N, Ciou C-B (2010) Image secret sharing method with two-decoding- options: lossless recovery and previewing capability. J Image Vision Comput 28(12):1600–1610
Yang C-N, Yang Y-Y (2014) New extended visual cryptography schemes with clearer shadow images. J Inf Sci 271(4):246–263
Yang C-N, Chen P-W, Shih H-W, Kim C (2013) Aspect ratio invariant visual cryptography by image filtering and resizing. J Pers Ubiquit Comput 17(5):843–850
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sridhar, S., Sathishkumar, R. & Sudha, G.F. Adaptive halftoned visual cryptography with improved quality and security. Multimed Tools Appl 76, 815–834 (2017). https://doi.org/10.1007/s11042-015-3066-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-3066-7