A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy

In 2007, Wang et al. proposed two visual secret sharing schemes based on Boolean operations. One is a probabilistic (2, n) secret sharing (SS) scheme, called (2, n) ProbVSS scheme, for binary images and the other is a deterministic (n, n) SS scheme for grayscale images. Their schemes can solve the problems of computational complexity and pixel expansion at the same time. To provide a (2, n) ProbVSS scheme that demonstrates better reconstructed grayscale image quality than Wang et al. 's scheme without significantly increasing computational complexity, we apply the voting strategy and the least significant bits abandoning approach in combination with the first scheme of Wang et al. 's to handle grayscale images. Experimental results confirm that the reconstructed grayscale image quality in this proposed scheme is better than that achieved by using the pure Wang et al.'s scheme.

[1]  Shyong Jian Shyu,et al.  Efficient visual secret sharing scheme for color images , 2006, Pattern Recognit..

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  R. Ito,et al.  Image Size Invariant Visual Cryptography , 1999 .

[4]  Stelvio Cimato,et al.  Probabilistic Visual Cryptography Schemes , 2006, Comput. J..

[5]  Yen-Ping Chu,et al.  A multiple-level visual secret-sharing scheme without image size expansion , 2007, Inf. Sci..

[6]  Moni Naor,et al.  Visual cryptography for grey level images , 2000, Inf. Process. Lett..

[7]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[8]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[9]  Ching-Nung Yang,et al.  New Colored Visual Secret Sharing Schemes , 2000, Des. Codes Cryptogr..

[10]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[11]  Somnath Sikdar,et al.  A New (2, n)-Visual Threshold Scheme for Color Images , 2003, INDOCRYPT.

[12]  Eric R. Verheul,et al.  Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..

[13]  Ning Ma,et al.  Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..