Resolution variant visual cryptography for street view of Google Maps

Resolution variant visual cryptography takes the idea of using a single share of visual cryptography (VC) to recover a secret from an image at multiple resolutions. That means, viewing the image on a one-to-one basis and superimposing the share will recover the secret. However, if the image is zoomed, using that same share we can recover other secrets at different levels. The same share is used at these varying resolutions in order to recover a large amount of hidden secrets. This process is quite similar to watermarking an image, whereby nothing can be seen while fully zoomed out, but as the zoom level is increased the watermark becomes visible. This would also be associated with a recursive style of secret sharing. This type of secret sharing scheme would be appropriate for recovering specific types of censored information, such as vehicle registration numbers within certain types of images. This adds an additional dimension to our scheme: content based visual cryptography.

[1]  Sandeep Katta Recursive Information Hiding in Visual Cryptography , 2010, IACR Cryptol. ePrint Arch..

[2]  Ina Koch,et al.  Enumerating all connected maximal common subgraphs in two graphs , 2001, Theor. Comput. Sci..

[3]  Mohan S. Kankanhalli,et al.  Progressive color visual cryptography , 2005, J. Electronic Imaging.

[4]  D. Crookes,et al.  Secure mask for color image hidding , 2008, 2008 Third International Conference on Communications and Networking in China.

[5]  Subhash C. Kak,et al.  Space Efficient Secret Sharing: A Recursive Approach , 2009, IACR Cryptol. ePrint Arch..

[6]  Subhash C. Kak,et al.  RECURSIVE HIDING OF SECRETS IN VISUAL CRYPTOGRAPHY , 2002, Cryptologia.

[7]  Wei Qi Yan,et al.  Dot-Size Variant Visual Cryptography , 2009, IWDW.

[8]  Alfredo De Santis,et al.  Contrast Optimal Threshold Visual Cryptography Schemes , 2003, SIAM J. Discret. Math..

[9]  WeiQi Yan,et al.  Sharing multiple secrets using visual cryptography , 2009, 2009 IEEE International Symposium on Circuits and Systems.

[10]  Jiaxin Wang,et al.  An efficient method of license plate location , 2005, Pattern Recognit. Lett..

[11]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[12]  Mohan S. Kankanhalli,et al.  Image Hatching for Visual Cryptography , 2009, 2009 13th International Machine Vision and Image Processing Conference.

[13]  Alfredo De Santis,et al.  Extended Schemes for Visual Cryptography , 1995 .

[14]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[15]  Sei-Wang Chen,et al.  Automatic license plate recognition , 2004, IEEE Transactions on Intelligent Transportation Systems.