WEB-VC: Visual Cryptography for Web Image

The conventional encryption techniques of visual cryptography are extended to web page. The key point is that Cascading Style Sheet blend modes can simulate stacking operators. The multiply blend mode can be regarded as Boolean OR operator, and the difference blend mode can be regarded as exclusive-OR (XOR) operator. Thus, the secrets can be revealed in a web browser by overlapping shares together without any additional computation. We named this scheme Web-VC. The decoding procedure of Web-VC is just like usual visual cryptography, while digital shares can be used in this case. Web-VC has strong ability of resisting compression and transcoding without losing the secret. Another contribution of this work is the method of XOR-based flip visual cryptography.

[1]  Tom Yeh,et al.  CraftML: 3D Modeling is Web Programming , 2018, CHI.

[2]  Bin Yu,et al.  Perfect contrast XOR-based visual cryptography schemes via linear algebra , 2017, Des. Codes Cryptogr..

[3]  Yi-Chong Zeng,et al.  High capacity multi-scale image sharing scheme by combining visual cryptography with data hiding , 2013, 2013 IEEE International Conference on Image Processing.

[4]  S. Manimurugan,et al.  A Survey on Various Visual Secret Sharing Schemes with an Application , 2012 .

[5]  Bin Yu,et al.  General construction for XOR-based visual cryptography and its extended capability , 2016, Multimedia Tools and Applications.

[6]  Ja-Chen Lin,et al.  Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion , 2010, J. Vis. Commun. Image Represent..

[7]  Wei Sun,et al.  Non-expansible XOR-based visual cryptography scheme with meaningful shares , 2015, Signal Process..

[8]  Ja-Chen Lin,et al.  An image-sharing method with user-friendly shadow images , 2003, IEEE Trans. Circuits Syst. Video Technol..

[9]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[10]  Ali Mesbah,et al.  Discovering refactoring opportunities in cascading style sheets , 2014, SIGSOFT FSE.

[11]  Punt Leonard,et al.  The A?B*A Pattern: Undoing Style in CSS and Refactoring Opportunities It Presents , 2016 .

[12]  Takamichi Saito,et al.  Web Browser Fingerprinting Using Only Cascading Style Sheets , 2015, 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA).

[13]  Yu-Chi Chen,et al.  Fully Incrementing Visual Cryptography From a Succinct Non-Monotonic Structure , 2017, IEEE Transactions on Information Forensics and Security.

[14]  Henk D. L. Hollmann,et al.  XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..

[15]  Ja-Chen Lin,et al.  All-in-one visual and computer decoding of multiple secrets: translated-flip VC with polynomial-style sharing , 2017 .

[16]  Masaaki Fujiyoshi,et al.  A cheat preventing method with efficient pixel expansion for Naor-Shamir's visual cryptography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[17]  E. Keren,et al.  Encryption of pictures and shapes by random grids. , 1987, Optics letters.

[18]  Suneeta Agarwal,et al.  Progressive Visual Cryptography with Unexpanded Meaningful Shares , 2016, TOMM.

[19]  M. Sukumar Reddy,et al.  Visual Cryptography Scheme for Secret Image Retrieval , 2014 .

[20]  Banu Diri,et al.  Defect prediction for Cascading Style Sheets , 2016, Appl. Soft Comput..

[21]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..