Improved scheme and evaluation method for progressive visual cryptography

被引:0
|
作者
Thai, Binh Le Thanh [1 ]
Tanaka, Hidema [1 ]
Watanabe, Kohtaro [1 ]
机构
[1] Natl Def Acad Japan, Dept Comp Sci, Yokosuka, Japan
关键词
Visual cryptography; Progressive visual cryptography; Information-theoretic evaluation method; Shannon-Hartley theorem; SECRET SHARING SCHEMES;
D O I
10.1186/s13635-022-00136-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptography (VC) is a powerful technique with high security and requires no PC or device to reconstruct the secret information. Progressive visual cryptography (PVC) is a variation of the VC scheme in which the quality of the reconstructed image is improved by increasing the number of shared images. The previous study focused directly on maximizing the value of the quality in the completely reconstructed image; thus, there is a difference in the quality of the shared images. In this paper, we focus on the aforementioned issue and propose a new approach based on inductive reasoning. Our basic idea is to maximize the quality of the reconstructed images each time the number of shared images increases. We call this method the bottom-up approach. Moreover, hitherto, PVC has been evaluated based on the value of relative difference or by sight. Such evaluation methods are only subjective or difficult to execute without the knowledge of basis matrices. In addition, PVC users cannot easily confirm the effectiveness of their shared images. In this paper, we propose a new information-theoretic evaluation method for PVC, which only uses shared images, to solve the aforementioned problems. Our proposed method can objectively and quantitatively evaluate PVC based on the numerical value, and PVC users can easily confirm the effectiveness of their shared images.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Improved Image Copyright Protection Scheme Exploiting Visual Cryptography in Wavelet Domain
    Meneghetti, A.
    Boato, G.
    De Natale, F. G. B.
    IMAGE PROCESSING: ALGORITHMS AND SYSTEMS XI, 2013, 8655
  • [22] Improved schemes for visual cryptography
    Blundo, C
    Bonis, AD
    Santis, AD
    DESIGNS CODES AND CRYPTOGRAPHY, 2001, 24 (03) : 255 - 278
  • [23] Improved Schemes for Visual Cryptography
    Carlo Blundo
    Annalisa De Bonis
    Alfredo De Santis
    Designs, Codes and Cryptography, 2001, 24 : 255 - 278
  • [24] An Improved QR Code Based on (2,2) Visual Cryptography Scheme
    Han, Yanyan
    Shang, Yixiao
    Dong, Haocong
    He, Wencai
    PROCEEDINGS OF THE 2013 ASIA-PACIFIC COMPUTATIONAL INTELLIGENCE AND INFORMATION TECHNOLOGY CONFERENCE, 2013, : 397 - 406
  • [25] Research on Rotation Visual Cryptography Scheme
    Fu, Zhengxin
    Yu, Bin
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 533 - 536
  • [26] Digital watermarking scheme with visual cryptography
    Hsu, Ching-Sheng
    Tu, Shu-Fen
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 659 - 662
  • [27] Visual Cryptography Scheme with Essential Participants
    Li, Peng
    Yin, Liping
    Ma, Jianfeng
    MATHEMATICS, 2020, 8 (05)
  • [28] Optimization of XOR Visual Cryptography Scheme
    Shi, Lin
    Yu, Bin
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 297 - 301
  • [29] Cheating immune visual cryptography scheme
    Liu, F.
    Wu, C.
    Lin, X.
    IET INFORMATION SECURITY, 2011, 5 (01) : 51 - 59
  • [30] A Lossless Tagged Visual Cryptography Scheme
    Wang, Xiang
    Pei, Qingqi
    Li, Hui
    IEEE SIGNAL PROCESSING LETTERS, 2014, 21 (07) : 853 - 856