Feature and Future of Visual Cryptography Based Schemes

Visual cryptography (VC) is a useful technique that combines the notions of perfect ciphers and secret sharing in cryptography. VC takes a binary image (the secret) and divides it into two or more pieces known as shares. When the shares are printed on transparencies and then superimposed, the secret can be recovered. No computer participation is required. There are various measures on which performance of visual cryptography scheme depends, such as pixel expansion, contrast, security, accuracy, computational complexity, share generated is meaningful or meaningless, type of secret images (either binary or color) and number of secret images(either single or multiple) encrypted by the scheme. In this paper, we will summarize the developments of visual cryptography since its birth in 1994, introduce the main research topics in this area where researchers have been contributing and outline the application of these schemes.

[1]  Hideki Imai,et al.  An extended construction method for visual secret sharing schemes , 1998 .

[2]  Mahmoud A. Hassan,et al.  Self Watermarking based on Visual Cryptography , 2007 .

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Jianying Zhou,et al.  Information and Communications Security , 2013, Lecture Notes in Computer Science.

[5]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[6]  Wen-Guey Tzeng,et al.  A New Approach for Visual Cryptography , 2002, Des. Codes Cryptogr..

[7]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[8]  Young-Chang Hou,et al.  An asymmetric watermarking scheme based on visual cryptography , 2000, WCC 2000 - ICSP 2000. 2000 5th International Conference on Signal Processing Proceedings. 16th World Computer Congress 2000.

[9]  Zhongmin Wang,et al.  Halftone Visual Cryptography Through Error Diffusion , 2006, 2006 International Conference on Image Processing.

[10]  Wen-Guey Tzeng,et al.  Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.

[11]  Ching-Nung Yang,et al.  Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality , 2007, Int. J. Pattern Recognit. Artif. Intell..

[12]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[13]  Chin-Chen Chang,et al.  Sharing visual multi-secrets using circle shares , 2005, Comput. Stand. Interfaces.

[14]  Yen-Ping Chu,et al.  A multiple-level visual secret-sharing scheme without image size expansion , 2007, Inf. Sci..

[15]  Ching-Nung Yang,et al.  Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion , 2005, Pattern Recognit. Lett..

[16]  Ching-Nung Yang,et al.  New Colored Visual Secret Sharing Schemes , 2000, Des. Codes Cryptogr..

[17]  Henk D. L. Hollmann,et al.  XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..

[18]  Alfredo De Santis,et al.  Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.

[19]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.

[20]  Ran-Zan Wang,et al.  Sharing multiple secrets in visual cryptography , 2007, Pattern Recognit..

[21]  Stelvio Cimato,et al.  Ideal contrast visual cryptography schemes with reversing , 2005, Inf. Process. Lett..

[22]  Alfredo De Santis,et al.  Contrast Optimal Threshold Visual Cryptography Schemes , 2003, SIAM J. Discret. Math..

[23]  Kaoru Kurosawa,et al.  Almost Ideal Contrast Visual Cryptography with Reversing , 2004, CT-RSA.

[24]  Moni Naor,et al.  Visual Cryptography II: Improving the Contrast Via the Cover Base , 1996, Security Protocols Workshop.

[25]  Oscar C. Au,et al.  A novel method to embed watermark in different halftone images: data hiding by conjugate error diffusion (DHCED) , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[26]  Ching-Nung Yang,et al.  Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions , 2006, ICIAR.

[27]  Ching-Nung Yang,et al.  Real Perfect Contrast Visual Secret Sharing Schemes with Reversing , 2006, ACNS.

[28]  Gwoboa Horng,et al.  Cheating in Visual Cryptography , 2006, Des. Codes Cryptogr..

[29]  Tatsuaki Okamoto Topics in Cryptology – CT-RSA 2004 , 2004, Lecture Notes in Computer Science.

[30]  Mohamed S. Kamel,et al.  Image Analysis and Recognition , 2014, Lecture Notes in Computer Science.

[31]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[32]  Tung-Shou Chen,et al.  The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.

[33]  Ja-Ling Wu,et al.  Unseen Visible Watermarking , 2007, 2007 IEEE International Conference on Image Processing.

[34]  R. Ito,et al.  Image Size Invariant Visual Cryptography , 1999 .

[35]  Adam Finkelstein,et al.  Real-time hatching , 2001, SIGGRAPH.

[36]  Ching-Nung Yang,et al.  Size-Adjustable Visual Secret Sharing Schemes , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[37]  Yasuhiro Takishima,et al.  Visual Cryptography Based on Void-And-Cluster Halftoning Technique , 2006, 2006 International Conference on Image Processing.

[38]  Ren-Junn Hwang,et al.  A Digital Image Copyright Protection Scheme Based on Visual Cryptography , 2000 .

[39]  Mohan S. Kankanhalli,et al.  Visual cryptography for print and scan applications , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[40]  Jeng-Shyang Pan,et al.  Hiding Multiple Watermarks in Transparencies of Visual Cryptography , 2007 .

[41]  Ina Koch,et al.  Enumerating all connected maximal common subgraphs in two graphs , 2001, Theor. Comput. Sci..

[42]  Daniel L. Lau,et al.  Modern Digital Halftoning , 2001 .

[43]  Ching-Nung Yang,et al.  New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[44]  Burton S. Kaliski Advances in Cryptology - CRYPTO '97 , 1997 .

[45]  Wen-Pinn Fang,et al.  Friendly progressive visual secret sharing , 2008, Pattern Recognit..

[46]  Yasuhiro Takishima,et al.  Halftone Visual Cryptography Embedding a Natural Grayscale Image Based on Error Diffusion Technique , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[47]  Ning Ma,et al.  Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..

[48]  Henry R. Kang Digital Color Halftoning , 1999 .

[49]  Tzung-Her Chen,et al.  (Designs, Codes and Cryptography,38(2):219-236)Cheating in Visual Cryptography , 2006 .

[50]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[51]  Susanne Wetzel,et al.  Traceable visual cryptography , 1997, ICICS.

[52]  Yasushi Yamaguchi,et al.  Extended Visual Cryptography for Natural Images , 2002, WSCG.

[53]  Robert Ulichney,et al.  Digital Halftoning , 1987 .