visual cryptography schemes with perfect reconstruction of black pixels

S. Anu,

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:3         Issue:1         Year: 26 June,2014         Pages:263-269

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes (VSSs) for general access structures (GASs). We propose here in a general and systematic approach to address these issues without sophisticated codebook design. The approach can be used for binary secret images in non-computer-aided decryption environments. To avoid pixel expansion, we design a set of column vectors to encrypt secret pixels rather than use the conventional VC-based approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulated-annealing-based algorithm to solve the problem. It indicates that the display quality of the recovered image is superior to that of previous studies.

Kewords

SIVCSs or VCSs

Reference

[1] M. Naor and A. Shamir, ―Visual Cryptography,‖ Advances in Cryptology: Eurprocrypt'94, vol. 950, pp. 1–12, 1995. [2] J. Weir and W. Yan, ―A Comprehensive Study of Visual Cryptography,‖ Transactions on Data Hiding and Multimedia Security V , LNCS, vol. 6010, pp. 70—105, 2010. [3] C. N. Yang, ―New Visual Secret Sharing Schemes using Probabilistic Method,‖ Pattern Recognition Letters, vol. 25, no. 4, pp. 481–494, 2004. [4] R. Ito, H. Kuwakado, and H. Tanaka, ―Image Size Invariant Visual Cryptography,‖ IEICE Transactions on Fundamentals, vol. E82-A, no. 10, pp. 2172–2177, 1999. [5] P. L. Chiu and K. H. Lee, ―A Simulated Annealing Algorithm for General Threshold Visual Cryptography Schemes,‖ IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, 2011. [6] G. Ateniese, C. Blundo, A. D. Santis et al., ―Visual Cryptography for General Access Structures,‖ Information and Computation, vol. 129, no. 2, pp. 86–106, 1996. [7] C. S. Hsu and Y. C. Hou, ―Goal-Programming-Assisted Visual Cryptography Method with Unexpanded Shadow Images for General Access Structures,‖ Optical Engineering, vol. 45, no. 9, pp. 097001-1 (10 pages), 2006. [8] C. S. Hsu, S. F. Tu, and Y. C. Hou, ―An Optimization Model for Visual Cryptography Schemes with Unexpanded Shares,‖ Foundations of Intelligent Systems, LNAI, vol. 4203, pp. 58–67, 2006.