Embedded Extended Visual Cryptography Scheme

Visual Cryptography facilitates hiding a secret image into n number of shares distributed to n number of participants. This kind of scheme is very useful as the participants in such security systems need not know the cryptographic knowledge in order to recover the secret image from the shares. This phenomenon is known as VCS (Visual Cryptography Scheme). An extended VCS is the one which is capable of generating meaningful shares when compared with the shares of the VCS. This paper proposes construction of EVCS by embedding the random shares (result of VCS) into covering images. The empirical results revealed that the proposed EVCS is more secure and flexible than the EVCSs found in literature. Index Terms: VCS, random shares, covering shares, secret sharing.

[1]  Feng Liu,et al.  Colour visual cryptography schemes , 2008, IET Inf. Secur..

[2]  Annalisa De Bonis,et al.  Improved Schemes for Visual Cryptography , 2001, Des. Codes Cryptogr..

[3]  Lesley Anne MacPherson Grey Level Visual Cryptography for General Access Structures , 2002 .

[4]  Giovanni Di Crescenzo,et al.  Halftone visual cryptography via direct binary search , 2006, 2006 14th European Signal Processing Conference.

[5]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[6]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[7]  Douglas R. Stinson,et al.  Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels , 2002, Des. Codes Cryptogr..

[8]  Ran-Zan Wang,et al.  Sharing multiple secrets in visual cryptography , 2007, Pattern Recognit..

[9]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[10]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[11]  Tzungher Chen,et al.  Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol , 2006, Pattern Recognit..

[12]  Zhongmin Wang,et al.  Halftone Visual Cryptography Through Error Diffusion , 2006, 2006 International Conference on Image Processing.

[13]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[14]  Yasushi Yamaguchi,et al.  Extended Visual Cryptography for Natural Images , 2002, WSCG.

[15]  Jeng-Shyang Pan,et al.  Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data Hiding , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[16]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[17]  Giovanni Di Crescenzo,et al.  Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.

[18]  S. Govindaraju,et al.  Visual Secret Sharing Schemes for Color Images Using Halftoning , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[19]  Gwoboa Horng,et al.  On generating meaningful shares in visual secret sharing scheme , 2008 .

[20]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..

[21]  Xiaobo Li,et al.  On general construction for extended visual cryptography schemes , 2009, Pattern Recognit..

[22]  J. Limb Design of dither waveforms for quantized visual signals , 1969 .

[23]  Chang-Chou Lin,et al.  Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..

[24]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[25]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[26]  Mohan S. Kankanhalli,et al.  Progressive color visual cryptography , 2005, J. Electronic Imaging.

[27]  Stefan Droste,et al.  New Results on Visual Cryptography , 1996, CRYPTO.