Equivalence Proof of Traditional and Random Grid-Based (2, 2) Visual Secret Sharing

Visual secret sharing (VSS) has attracted considerable attention to scientists and engineers as another branch alongside conventional cryptography to protect the sensitive visual information from several rapacious behaviors. In the literature, there are a number of several techniques used to protect the visual information, among which traditional VSS and random grid (RG)-based VSS are the primary branches. In this letter, we show, by examples, the two means are equal. In addition, the color representation of traditional VSS and RG-based VSS found it different from digital applications like images. Based on the given examples, it is demonstrated that the color representation of the two means can be the same and confirm with digital processing applications.

[1]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[2]  Alfredo De Santis,et al.  Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.

[3]  Feng Liu,et al.  Threshold visual secret sharing by random grids with improved contrast , 2013, J. Syst. Softw..

[4]  WeiQi Yan,et al.  A Comprehensive Study of Visual Cryptography , 2010, Trans. Data Hiding Multim. Secur..

[5]  E. Keren,et al.  Encryption of pictures and shapes by random grids. , 1987, Optics letters.

[6]  Wei Sun,et al.  Improving the visual quality of random grid-based visual secret sharing , 2013, Signal Process..

[7]  Tzung-Her Chen,et al.  Threshold visual secret sharing by random grids , 2011, J. Syst. Softw..

[8]  Shyong Jian Shyu,et al.  Image encryption by random grids , 2007, Pattern Recognit..

[9]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[10]  Giovanni Di Crescenzo,et al.  Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.

[11]  Ning Ma,et al.  Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..

[12]  Xuehu Yan,et al.  Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery , 2013, Multimedia Tools and Applications.

[13]  Yun Q. Shi,et al.  Transactions on Data Hiding and Multimedia Security III , 2008, Trans. Data Hiding and Multimedia Security.

[14]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.