The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Progressive Visual Cryptography with Friendly and Size Invariant Shares

Visual cryptography is an important data encoding method, where a secret image is encoded into n pieces of noise- like shares. As long as there are over k shares stacked out of n shares, the secret image can be directly decoded by the human naked eye; this cannot be done if less than k shares are available. This is called the (k, n)-threshold Visual Secret Sharing Scheme (VSS). Progressive Visual Cryptography (PVC) differs from the traditional VSS, in that the hidden image is gradually decoded by superimposing two or more shares. As more and more shares are stacked, the outline of the hidden image becomes clearer. In this study, we develop an image sharing method based on the theory of PVC, which utilizes meaningful non- expanded shares. Using four elementary matrices (C0-C3) as the building blocks, our dispatching matrices (M0- M3) are designed to be expandable so that the contrast in both the shares and the restored image can be adjusted based on user needs. In addition, the recovered pixels in the black region of the secret image are guaranteed to be black, which improves the display quality of the restored image. The image content can thus be displayed more clearly than that by previous methods.


[1] Ateniese G., Blundo C., Santis A., and Stinson D., Extended Capabilities for Visual 330 The International Arab Journal of Information Technology, Vol. 15, No. 2, March 2018 Cryptography, Theoretical Computer Science, vol. 250, no. 1-2, pp.143-161, 2001.

[2] Chen S. and Lin J., Fault-tolerant and Progressive Transmission of Images, Pattern Recognition, vol. 38, no.12, pp. 2466-2471, 2005.

[3] Fang W. and Lin J., Progressive Viewing and Sharing of Sensitive Images, Pattern Recognition Image Analysis, vol. 16, no. 4, pp. 632-636, 2006.

[4] Fang W., Friendly Progressive Visual Secret Sharing, Pattern Recognition, vol. 41, no. 4, pp. 1410-1414, 2008.

[5] Hou Y., Visual Cryptography for Color Images, Pattern Recognition, vol. 36, no.7, pp.1619-1629, 2003.

[6] Hou Y. and Quan Z., Progressive Visual Cryptography with Unexpanded Shares, IEEE Transactions on Circuits and Systems for Video Technology, vol. 21, no. 11, pp. 1760-1764, 2011.

[7] Hou Y., Quan Z., Tsai C., and Tseng A., Block- based Progressive Visual Secret Sharing, Information Sciences, vol. 233, pp. 290-304, 2013.

[8] Hou Y. and Wu J., An Extended Visual Cryptography Scheme for Concealing Color Images, in Proceeding of the 5th Conference on Information Management and Police Administrative Practice, Taoyuan, pp. 62-69, 2001.

[9] Ito R., Kuwakado H., and Tanaka H., Image Size Invariant Visual Cryptography, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E82-A, no. 10, pp. 2172-2177, 1999.

[10] Jin D., Yan W., and Kankanhalli M., Progressive Color Visual Cryptography, Journal of Electronic Imaging, vol. 14, no. 3, pp. 033019-1- 033019-13, 2005.

[11] Naor M. and Shamir A., Visual Cryptography, Advances in Cryptology-Eurpocrypt 94, Lecture Notes in Computer Science, vol. 950, pp. 1-12, 1995.

[12] Shamir A., How to Share a Secret, Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.

[13] Thien C. and Lin J., Secret Image Sharing, Computers & Graphics, vol. 26, no. 5 pp. 765- 770, 2002.

[14] Tu S. and Hou Y., Design of Visual Cryptographic Methods with Smooth-looking Decoded Images of Invariant size for Gray Level Images, Imaging Science Journal, vol. 55, no. 2, pp. 90-101, 2007.

[15] Tu S. and Hsu C., A Joint Ownership Protection Scheme for Digital Images based on Visual Cryptography, The International Arab Journal of Information Technology, vol. 9, no. 3, pp. 276- 283, 2012.

[16] Wang R. and Shyu S., Scalable Secret Image Sharing, Signal Processing: Image Communication, vol. 22, no.4, pp. 363-373, 2007. Young-Chang Hou received his B.S. degree in atmospheric physics from National Central University, Taiwan in 1972, his M.S. degree in computer applications from Asian Institute of Technology, Bangkok, Thailand in 1983, and his Ph.D. degree in computer science and information engineering from National Chiao-Tung University, Taiwan in 1990. From 1976 to 1987, he was a senior engineer with Air Navigation and Weather Services, Civil Aeronautical Administration, Taiwan, where his work focused on the automation of weather services. From 1987 to 2004, he was on the faculty at the Department of Information Management, National Central University. Currently he is a professor with the Department of Information Management, Tamkang University, Taiwan. His research interests include digital watermarking, information hiding, fuzzy logic, genetic algorithms, and visual cryptography. Zen-Yu Quan received his B.S. degree in Information management from Tatung University, Taiwan in 2007, his M.S. degree in information management from Tamkang University, Taiwan in 2009. He is currently a PhD student at the Department of Information Management, National Central University, Taiwan. His research interests cover secret sharing, digital watermark, and image retrieval. Chih-Fong Tsai received a PhD at School of Computing and Technology from the University of Sunderland, UK in 2005. He is now a professor at the Department of Information Management, National Central University, Taiwan. His current research focuses on data mining and machine learning. He has published more than 50 professional publications and received the Emerald Literati Network 2008 Awards for Excellence from Online Information Review ( A Review of Image Retrieval Methods for Digital Cultural Heritage Resources ) and the award for top 10 cited articles in 2008 from Expert Systems with Applications ( Using Neural Network Ensembles for Bankruptcy Prediction and Credit Scoring ).