K out of K Extended Visual Cryptography Scheme by Random Grids

This paper first gives a formal definition of k out of k extended visual cryptography scheme by random grids ((k, k) RG-based EVCS), in which a secret image and k cover images are encoded into k share images in such a way that the k share images show the k cover images individually and the stacking of any k share images will reveal the secret image while from any less than k share images, we can deduce no information about the secret image. Then we present a (k, k) RG-based EVCS that needs neither extra pixel expansion nor any basis matrices (codebook), which are inevitable in conventional solutions of EVCS. In addition, the proposed scheme can easily trade the visual quality of the decoded image with the visual quality of share images by setting a certain parameter in the scheme from small to large. The correctness of the proposed scheme is validated by formal proofs, and its feasibility is demonstrated by computer simulations.

[1]  Feng Liu,et al.  The alignment problem of visual cryptography schemes , 2009, Des. Codes Cryptogr..

[2]  Alfredo De Santis,et al.  Contrast Optimal Threshold Visual Cryptography Schemes , 2003, SIAM J. Discret. Math..

[3]  Alfredo De Santis,et al.  On the Contrast in Visual Cryptography Schemes , 1999, Journal of Cryptology.

[4]  Ching-Nung Yang,et al.  $k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography , 2012, IEEE Trans. Circuits Syst. Video Technol..

[5]  Tzung-Her Chen,et al.  Insight into collusion attacks in random-grid-based visual secret sharing , 2012, Signal Process..

[6]  Shyong Jian Shyu,et al.  Image encryption by random grids , 2007, Pattern Recognit..

[7]  Shyong Jian Shyu,et al.  Image encryption by multiple random grids , 2009, Pattern Recognit..

[8]  Wen-Guey Tzeng,et al.  Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.

[9]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[10]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[11]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[12]  Tzung-Her Chen,et al.  Threshold visual secret sharing by random grids , 2011, J. Syst. Softw..

[13]  Xiaobo Li,et al.  Towards Shift Tolerant Visual Secret Sharing Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[14]  Feng Liu,et al.  Threshold visual secret sharing by random grids with improved contrast , 2013, J. Syst. Softw..

[15]  Shyong Jian Shyu,et al.  Efficient Construction for Region Incrementing Visual Cryptography , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[16]  Tzung-Her Chen,et al.  (Designs, Codes and Cryptography,38(2):219-236)Cheating in Visual Cryptography , 2006 .

[17]  Thierry Fournel,et al.  Two-out-of-two color matching based visual cryptography schemes. , 2012, Optics express.

[18]  Gwoboa Horng,et al.  Comment on “Cheating Prevention in Visual Cryptography” , 2012, IEEE Transactions on Image Processing.

[19]  Mausumi Bose,et al.  Optimal (k, n) visual cryptographic schemes for general k , 2010, Des. Codes Cryptogr..

[20]  Daniel L. Lau,et al.  Modern Digital Halftoning , 2001 .

[21]  Gwoboa Horng,et al.  Cheating in Visual Cryptography , 2006, Des. Codes Cryptogr..

[22]  Chuankun Wu,et al.  Embedded Extended Visual Cryptography Schemes , 2011, IEEE Transactions on Information Forensics and Security.

[23]  Giovanni Di Crescenzo,et al.  Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.

[24]  Xiaotian Wu,et al.  Random grid-based visual secret sharing for general access structures with cheat-preventing ability , 2012, J. Syst. Softw..

[25]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..

[26]  Mausumi Bose,et al.  Optimal (2, n) visual cryptographic schemes , 2006, Des. Codes Cryptogr..

[27]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[28]  R. Ito,et al.  Image Size Invariant Visual Cryptography , 1999 .

[29]  Tzung-Her Chen,et al.  Visual secret sharing by random grids revisited , 2009, Pattern Recognit..

[30]  Tzung-Her Chen,et al.  User-Friendly Random-Grid-Based Visual Secret Sharing , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[31]  Feng Liu,et al.  Improving the visual quality of size invariant visual cryptography scheme , 2012, J. Vis. Commun. Image Represent..

[32]  Feng Liu,et al.  On the Equivalence of Two Definitions of Visual Cryptography Scheme , 2012, ISPEC.

[33]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[34]  E. Keren,et al.  Encryption of pictures and shapes by random grids. , 1987, Optics letters.

[35]  Ran-Zan Wang,et al.  Region Incrementing Visual Cryptography , 2009, IEEE Signal Processing Letters.

[36]  Feng Liu,et al.  Multi-pixel Encryption Visual Cryptography , 2011, Inscrypt.