Color transfer visual cryptography with perfect security

被引:5
|
作者
Yang, Ching-Nung [1 ]
Tung, Tzu-Chia [1 ]
Wu, Fu-Heng [1 ]
Zhou, Zhili [2 ]
机构
[1] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien, Taiwan
[2] NanJing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
关键词
Visual cryptography; Secret sharing; Threshold scheme; Digital halftoning; Halftoned image; Color transfer; SECRET SHARING SCHEME; RANDOM GRIDS; SIZE; ENCRYPTION; IMAGES;
D O I
10.1016/j.measurement.2016.10.042
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Recently, Luo et al. introduced the concept of the color transfer visual cryptographic scheme (CTVCS) by embedding the information of color channels R, G and B into the conventional (k, n)-VCS. Luo et al.'s (k, n)CTVCS visually decoded the halftoned secret image by stacking any k shadow images similar to the conventional (k, n)-VCS and obtained a high-quality color image. However, Luo et al.'s (k, n)-CTVCS requires a key in the encoding and decoding phases and therefore it is, strictly speaking, not a threshold scheme with perfect security. In this study, we solved this security problem and proposed a (k, n)-CTVCS that does not require a key. This experiment indicated that the proposed solution achieves the same feature (obtaining the original color image) as Luo et al.'s (k, n)-CTVCS. In addition, we formally defined contrast and security conditions of a (k, n)-CTVCS and demonstrated that our constructions satisfied the contrast and security conditions of a (k, n)-CTVCS. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:480 / 493
页数:14
相关论文
共 50 条
  • [1] Color transfer in visual cryptography
    Luo, Hao
    Chen, Hua
    Shang, Yongheng
    Zhao, Zhenfei
    Zhang, Yanhua
    MEASUREMENT, 2014, 51 : 81 - 90
  • [2] A New Color Visual Cryptography Scheme with Perfect Contrast
    Liu, Xiao-Yi
    Chen, Ming-Song
    Zhang, Ya-Li
    2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 449 - 454
  • [3] Authenticated Color Extended Visual Cryptography with Perfect Reconstruction
    Sathishkumar, R.
    Sudha, Gnanou Florence
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 609 - 615
  • [4] On the security of a visual cryptography scheme for color images
    Leung, Bert W.
    Ng, Felix Y.
    Wong, Duncan S.
    PATTERN RECOGNITION, 2009, 42 (05) : 929 - 940
  • [5] Color Image Visual Cryptography Scheme with Enhanced Security
    Khokhar, Prachi
    Jena, Debasish
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 267 - 279
  • [6] WiP: Security Enhanced Size Invariant Visual Cryptography with Perfect Reconstruction of White Pixels
    Jisha, T. E.
    Monoth, Thomas
    INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 279 - 289
  • [7] Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion
    Lin, Sian-Jheng
    Chen, Shang-Kuan
    Lin, Ja-Chen
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2010, 21 (08) : 900 - 916
  • [8] Progressive color visual cryptography
    Jin, D
    Yan, WQ
    Kankanhalli, MS
    JOURNAL OF ELECTRONIC IMAGING, 2005, 14 (03) : 1 - 13
  • [9] Color visual cryptography scheme
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao, 2006, 11 (1770-1775): : 1770 - 1775
  • [10] Visual cryptography for color images
    Hou, YC
    PATTERN RECOGNITION, 2003, 36 (07) : 1619 - 1629