A Modified Multi-Secret Visual Cryptography with Ring Shares

Article Preview

Abstract:

A visual cryptography scheme encoding multiple secret images into two ring shares is proposed in this paper. In the secret sharing process, two shares are produced by the marked areas and the basis matrices of (2, 2)-VCS. Using ring shift right function, the secret images are recovered by stacking two shares. The security and contrast properties of the scheme have been proved. Compared with the previous ones, the scheme makes the number of secret images unlimited. Furthermore, the pixel expansion and the relative difference are improved greatly.

You have full access to the following eBook

Info:

Periodical:

Pages:

343-349

Citation:

Online since:

September 2012

Authors:

Export:

Share:

Citation:

[1] A. Shamir, How to share a secret, Communications of the ACM, 22 (1979) 612-613.

DOI: 10.1145/359168.359176

Google Scholar

[2] G. R. Blakley, Safeguarding cryptographic keys, in: Proceedings of the National Computer Conference, NJ, USA, 1979, pp.242-268.

Google Scholar

[3] M. Naor, A. Shamir, Visual cryptography, in: Advances in Cryptology-Eurocrypt'94, Berlin, 1995, pp.1-12.

DOI: 10.1007/bfb0053419

Google Scholar

[4] G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, Visual cryptography for general access structures, Information and Computation, 129 (1996) 86-106.

DOI: 10.1006/inco.1996.0076

Google Scholar

[5] C. S. Hsu, S. F. Tu, Y. C. Hou, An optimization model for visual cryptography schemes with unexpanded shares, in: ISMIS2006, LNAI, Berlin, 2006, pp.58-67.

DOI: 10.1007/11875604_8

Google Scholar

[6] L. G. Fang, B. Yu, Research on pixel expansion of (2, n) visual threshold scheme, in: 1st International Symposium on Pervasive Computing and Applications Proceedings (SPCA06), Ningbo, 2006, pp.856-860.

DOI: 10.1109/spca.2006.297546

Google Scholar

[7] S. Lin, S. Chen, J. Lin, Flip visual cryptography (FVC) with perfect security, conditionally- optimal contrast, and no expansion, Journal of Visual Communication & Image Representation, 21 (2010) 900-916.

DOI: 10.1016/j.jvcir.2010.08.006

Google Scholar

[8] S. J. Shyu, M, C, Chen, Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes, IEEE Transactions on information forensics and security, 6 (2011) 960-969.

DOI: 10.1109/tifs.2011.2158096

Google Scholar

[9] C. C. Lin, W. H. Tai, Visual cryptography for gray-level images by dithering techniques, Pattern Recognition Letters, 24 (2003) 349-358.

DOI: 10.1016/s0167-8655(02)00259-3

Google Scholar

[10] S. Cimato, R. De Prisco, A. De Santis, Optimal colored threshold visual cryptography schemes, Designs, Codes and Cryptography, 35 (2005) 311-335.

DOI: 10.1007/s10623-003-6741-z

Google Scholar

[11] C. N. Yang, T. S. Chen, Colored visual cryptography scheme based on additive color mixing, Pattern Recognition, 41 (2008) 3114-3129.

DOI: 10.1016/j.patcog.2008.03.031

Google Scholar

[12] F. Y. Ng, D. S. Wong, On the security of a visual cryptography scheme for color images, Pattern Recognition, 42 (2009) 929-940.

DOI: 10.1016/j.patcog.2008.08.031

Google Scholar

[13] B. Yu, X. H. Xu, L. G. Fang, Multi-secret sharing threshold visual cryptography scheme, in: 2007 International Conference on Computational Intelligence and Security (CIS 2007), Harbin, 2007, pp.815-818.

DOI: 10.1109/cisw.2007.4425620

Google Scholar

[14] L. H. Chen, C. C. Wu, A study on visual cryptography, Master Thesis, National Chiao Tung University, Taiwan, (1998).

Google Scholar

[15] H. C. Wu, C. C. Chang, Sharing visual multi-secrets using circle shares, Computer Standards & Interfaces, 28 (2005) 123-135.

DOI: 10.1016/j.csi.2004.12.006

Google Scholar

[16] J. S. Shyong, S. Y. Huang, Y. K. Lee and R. Z. Wang, Sharing multiple secrets in visual crypto- graphy, Pattern Recognition, 40 (2007) 3633-3651.

DOI: 10.1016/j.patcog.2007.03.012

Google Scholar

[17] H. C. Hsu, T. S. Chen, Y. H. Lin, The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing, in: Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, Taipei, Taiwan, 2004, pp.996-1001.

DOI: 10.1109/icnsc.2004.1297083

Google Scholar

[18] J. B. Feng, H. C. Wub, C. S. Tsaic, Visual secret sharing for multiple secrets, Pattern Recog- nition, 41 (2008) 3572-3581.

Google Scholar