Halftone Visual Cryptography Via Error Diffusion

被引:171
|
作者
Wang, Zhongmin [1 ]
Arce, Gonzalo R. [1 ]
Di Crescenzo, Giovanni [2 ]
机构
[1] Univ Delaware, Dept Elect & Comp Engn, Newark, DE 19716 USA
[2] Telcordia Technol Inc, Math Sci Res Ctr, Morristown, NJ 07960 USA
关键词
Error diffusion; halftone visual cryptography (HVC); halftoning; visual cryptography (VC);
D O I
10.1109/TIFS.2009.2024721
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Halftone visual cryptography (HVC) enlarges the area of visual cryptography by the addition of digital halftoning techniques. In particular, in visual secret sharing schemes, a secret image can be encoded into halftone shares taking meaningful visual information. In this paper, HVC construction methods based on error diffusion are proposed. The secret image is concurrently embedded into binary valued shares while these shares are halftoned by error diffusion-the workhorse standard of halftoning algorithms. Error diffusion has low complexity and provides halftone shares with good image quality. A reconstructed secret image, obtained by stacking qualified shares together, does not suffer from cross interference of share images. Factors affecting the share image quality and the contrast of the reconstructed image are discussed. Simulation results show several illustrative examples.
引用
收藏
页码:383 / 396
页数:14
相关论文
共 50 条
  • [31] Size-invariant extended visual cryptography with embedded watermark based on error diffusion
    Yan, Bin
    Wang, Ya-Fei
    Song, Ling-Yun
    Yang, Hong-Mei
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (18) : 11157 - 11180
  • [32] (k,n) halftone visual cryptography based on Shamir's secret sharing
    Ding Haiyang
    Li Zichen
    Bi Wei
    [J]. The Journal of China Universities of Posts and Telecommunications, 2018, (02) : 60 - 76
  • [33] Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality
    Yan, Xuehu
    Wang, Shen
    Niu, Xiamu
    Yang, Ching-Nung
    [J]. DIGITAL SIGNAL PROCESSING, 2015, 38 : 53 - 65
  • [34] Cheating in (halftone-secret) visual cryptography: Analysis of blind authentication schemes
    Chen, Yu-Chi
    Horng, Gwoboa
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 85
  • [35] Watermark Embedding for Direct Binary Searched Halftone Images by Adopting Visual Cryptography
    Wang, Yangyang
    Ni, Rongrong
    Zhao, Yao
    Xian, Min
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (02): : 255 - 265
  • [36] Visual cryptography via halftoning
    Arce, GR
    Zhou, Z
    Di Crescenzo, G
    [J]. COLOR IMAGING IX: PROCESSING, HARDCOPY, AND APPLICATIONS, 2004, 5293 : 393 - 404
  • [37] Watermarking in halftone images with cooperating error diffusion and ordered dithering
    Pei, SC
    Guo, JM
    Lee, H
    [J]. PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, 2004, : 11 - 16
  • [38] Resampling Halftone Images Using Interpolation and Error-Diffusion
    Feng, Jen-Bang
    Lin, Iuon-Chang
    Chu, Yen-Ping
    Tsaur, Shyh-Chang
    [J]. COMPUTER JOURNAL, 2010, 53 (06): : 802 - 813
  • [39] Does error-diffusion halftone texture mask banding?
    Silverstein, A
    Chu, B
    [J]. IS&T'S NIP14: INTERNATIONAL CONFERENCE ON DIGITAL PRINTING TECHNOLOGIES, PROCEEDINGS, 1998, : 560 - 563
  • [40] Watermarking in halftone images with parity-matched error diffusion
    Guo, JM
    Pei, SC
    Lee, H
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 825 - 828