On the security of a visual cryptography scheme for color images

被引:14
|
作者
Leung, Bert W. [1 ]
Ng, Felix Y. [1 ]
Wong, Duncan S. [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
关键词
Visual cryptography; Dithering technology; Color decomposition; Secret sharing; Cryptanalysis; SECRET-SHARING SCHEME; CONTRAST; SIZE;
D O I
10.1016/j.patcog.2008.08.031
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Hou [Visual cryptography for color images, Pattern Recognition 36 (2003) 1619-1629] proposed a four-share visual cryptography scheme for color images. The scheme splits a dithered eight-color secret image into four shares: the black mask and other three shares. It was claimed that without knowing the black mask, no information about the secret image can be obtained even if all the other three shares are known. in this paper, we show that this may be true for a few specific two-color secret images only. In all other cases, however, security cannot be guaranteed. We show that an attacker can compromise a randomly chosen two-color secret image from any two of the other three shares with probability 4/7 by completely recovering the shape and pattern of the secret image. The advantage will increase to 6/7 all the three shares are known. If the secret image has three or four colors, we show that the attacker can compromise it with probability 4/7 and 8/35, respectively. Finally, we show that our technique can be extended to compromising secret images with more than four colors. (C) 2008 Elsevier Ltd. All rights reserved
引用
收藏
页码:929 / 940
页数:12
相关论文
共 50 条
  • [1] Algebraic visual cryptography scheme for color images
    Heidarinejad, Mohsen
    Yazdi, Amirhossein Alamdar
    Plataniotis, Konstantinos N.
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 1761 - 1764
  • [2] Color Image Visual Cryptography Scheme with Enhanced Security
    Khokhar, Prachi
    Jena, Debasish
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 267 - 279
  • [3] Visual cryptography scheme for secret color images with color QR codes
    Pan, Jeng-Shyang
    Liu, Tao
    Yang, Hong-Mei
    Yan, Bin
    Chu, Shu-Chuan
    Zhu, Tongtong
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 82
  • [4] EXTENDED VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGES WITH NO PIXEL EXPANSION
    Wu, Xiaoyu
    Wong, Duncan S.
    Li, Qing
    [J]. SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 423 - 426
  • [5] Threshold Visual Cryptography Scheme for Color Images with No Pixel Expansion
    Wu, Xiaoyu
    Wong, Duncan S.
    Li, Qing
    [J]. PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 310 - 315
  • [6] Visual cryptography for color images
    Hou, YC
    [J]. PATTERN RECOGNITION, 2003, 36 (07) : 1619 - 1629
  • [7] A Kind of Visual Cryptography Scheme For Color Images Based on Halftone Technique
    Qiao, Wei
    Yin, Hongdong
    Liang, Huaqing
    [J]. 2009 INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, VOL I, 2009, : 393 - 395
  • [8] Copyright protection scheme for color images using extended visual cryptography
    Kukreja, Sonal
    Kasana, Geeta
    Kasana, Singara Singh
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2021, 91
  • [9] HALFTONE VISUAL CRYPTOGRAPHY FOR COLOR IMAGES
    Pahuja, Shivani
    Kasana, Singara Singh
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 281 - 285
  • [10] Visual cryptography for JPEG color images
    Sudharsanan, S
    [J]. INTERNET MULTIMEDIA MANAGEMENT SYSTEMS V, 2004, 5601 : 171 - 178