A Hierarchical Image Cryptosystem Based on Visual Cryptography and Vector Quantization

The meaningless shares generated in visual cryptography scheme may attract hackers during transmission and thus possess a threat that if shares are captured and stacked by hacker, secret image may be revealed. To evade the attention of the hackers, Shamir’s (k, m)—secret sharing scheme may be used to encode the pixels of meaningless share images. The proposed image cryptosystem utilizes a three-dimensional vector quantization method to reduce the encoded data volume, as the Shamir’s scheme increases the size of the encoded data m times. Thus an image cryptosystem based on visual cryptography scheme, that encodes the meaningless shares and also manages the encoded data volume efficiently, is proposed here.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Debasis Giri,et al.  Hierarchical Visual Secret Sharing Scheme Using Steganography , 2015 .

[3]  Chang-Chou Lin,et al.  Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..

[4]  Young-Chang Hou,et al.  Progressive Visual Cryptography With Unexpanded Shares , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Vascan O. Orest,et al.  Improving vector quantization in image compression with Hilbert scan , 2013, 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP).

[6]  Jayanta K. Chandra,et al.  Quantum signal processing-based visual cryptography with unexpanded shares , 2015, J. Electronic Imaging.

[7]  Pei-Ling Chiu,et al.  Digital Image Sharing by Diverse Image Media , 2014, IEEE Transactions on Information Forensics and Security.

[8]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[9]  K. Shankar,et al.  RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography , 2017, China Communications.

[10]  Feng Liu,et al.  Colour visual cryptography schemes , 2008, IET Inf. Secur..

[11]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[12]  Howard M. Heys,et al.  Novel Visual Cryptography Schemes Without Pixel Expansion for Halftone Images , 2014, Canadian Journal of Electrical and Computer Engineering.

[13]  Rohit Srivastava,et al.  Hierarchical visual cryptography for grayscale image , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).

[14]  Yasushi Yamaguchi,et al.  Extended Visual Cryptography for Natural Images , 2002, WSCG.

[15]  Moni Naor,et al.  Visual cryptography for grey level images , 2000, Inf. Process. Lett..

[16]  Pei-Ling Chiu,et al.  A novel visual secret sharing scheme for multiple secrets without pixel expansion , 2010, Expert Syst. Appl..