Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality

In halftone visual cryptography scheme (HVCS), a secret image can be embedded into halftone shares with meaningful information of the cover images. Meaningful shares are significant since the efficiency of shares management will be increased and the suspicion of secret image encryption will be decreased. In this paper, we propose an HVCS construction method with minimum auxiliary black pixels (ABPs) distributed homogeneously, which is realized via embedding secret image into meaningful shares in the halftoned processing of the cover images by error diffusion. Secret information pixels (SIPs) are fixed in parallel and separated maximally from each other before the halftoned processing. The proposed scheme obtains admirable visual quality and some preferable advantages compared with related meaningful VC schemes (VCSs). Simulations and comparisons show the advantages and effectiveness of the proposed scheme.

[1]  Yasushi Yamaguchi,et al.  Extended Visual Cryptography for Natural Images , 2002, WSCG.

[2]  Annalisa De Bonis,et al.  Improved Schemes for Visual Cryptography , 2001, Des. Codes Cryptogr..

[3]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[4]  Ching-Nung Yang,et al.  Property Analysis of XOR-Based Visual Cryptography , 2014, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Daniel L. Lau,et al.  Modern Digital Halftoning , 2001 .

[6]  Ton Kalker,et al.  Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.

[7]  Gonzalo R. Arce,et al.  Alpha stable human visual system models for digital halftoning , 2006, Electronic Imaging.

[8]  Jeng-Shyang Pan,et al.  Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data Hiding , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[9]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[10]  E. Keren,et al.  Encryption of pictures and shapes by random grids. , 1987, Optics letters.

[11]  Shyong Jian Shyu,et al.  Image encryption by random grids , 2007, Pattern Recognit..

[12]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[13]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[14]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..

[15]  Xiaobo Li,et al.  On general construction for extended visual cryptography schemes , 2009, Pattern Recognit..

[16]  Feng Liu,et al.  Colour visual cryptography schemes , 2008, IET Inf. Secur..

[17]  Tzung-Her Chen,et al.  User-Friendly Random-Grid-Based Visual Secret Sharing , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[18]  Chuankun Wu,et al.  Embedded Extended Visual Cryptography Schemes , 2011, IEEE Transactions on Information Forensics and Security.

[19]  Alfredo De Santis,et al.  Contrast Optimal Threshold Visual Cryptography Schemes , 2003, SIAM J. Discret. Math..

[20]  Pheng-Ann Heng,et al.  Structure-aware halftoning , 2008, SIGGRAPH 2008.

[21]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[22]  Giovanni Di Crescenzo,et al.  Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.

[23]  S. Govindaraju,et al.  Visual Secret Sharing Schemes for Color Images Using Halftoning , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[24]  Gwoboa Horng,et al.  On generating meaningful shares in visual secret sharing scheme , 2008 .

[25]  Ning Ma,et al.  Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..

[26]  Jan P. Allebach,et al.  Model-based halftoning using direct binary search , 1992, Electronic Imaging.

[27]  R. Ito,et al.  Image Size Invariant Visual Cryptography , 1999 .

[28]  Daniel L. Lau,et al.  Modern Digital Halftoning, Second Edition , 2007 .

[29]  WeiQi Yan,et al.  A Comprehensive Study of Visual Cryptography , 2010, Trans. Data Hiding Multim. Secur..

[30]  Feng Liu,et al.  Step Construction of Visual Cryptography Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[31]  Ran-Zan Wang,et al.  Sharing multiple secrets in visual cryptography , 2007, Pattern Recognit..

[32]  Douglas R. Stinson,et al.  Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels , 2002, Des. Codes Cryptogr..

[33]  Jan P. Allebach,et al.  Impact of HVS models on model-based halftoning , 2002, IEEE Trans. Image Process..

[34]  Ching-Nung Yang,et al.  New extended visual cryptography schemes with clearer shadow images , 2014, Inf. Sci..

[35]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[36]  Stelvio Cimato,et al.  Probabilistic Visual Cryptography Schemes , 2006, Comput. J..

[37]  Robert Ulichney,et al.  Void-and-cluster method for dither array generation , 1993, Electronic Imaging.