Stelvio Cimato, Roberto De Prisco and Alfredo De Santis
Università degli Studi di Milano, Italy
Università di Salerno, Italy
5.2 Visual Cryptography Schemes
5.3 Canonical Probabilistic Schemes
5.4 Probabilistic Schemes with No Pixel Expansion
5.5 Trading Pixel Expansion with Probabilities
5.6 Constructing Probabilistic Schemes
5.6.1 (n, n)-Threshold Probabilistic Schemes with Any Pixel Expansion
5.6.2 (2, n)-Threshold Probabilistic Schemes with Any Pixel Expansion
5.7 Probabilistic Schemes with Boolean Operations
Visual cryptography schemes allow the encoding of a secret image, consisting of black or white pixels, into n shares that are distributed to the set P
The pixel expansion has a number of drawbacks, affecting the quality of the reconstructed image and the complexity of the visual cryptography scheme (VCS). In some cases, the pixel expansion is exponential, and this limits the applicability of the VCS. In general, the “quality” of the reconstructed image depends both on the pixel expansion and on the contrast, which is another measure of the goodness of the scheme. A number of papers studying the best pixel expansion and the best contrast have appeared in the literature. A partial list of such papers include [2, 4, 5, 6, 7, 12, 14, 15]. Some other papers have focused on different models or properties. For example, in [1], visual cryptography schemes for general access structures (where the qualified set of participants are arbitrary and not defined by a threshold of participants) have been studied. Schemes where the shares show meaningful pictures (not related to the secret) are studied in [3]. In [24] the problem of not distorting the original image is considered. Some research has also considered the case of colored images (see for example [10, 9, 19, 25]).
To deal with the pixel expansion, Yang [22, 23] has introduced a new model of visual cryptography in which the reconstruction of the secret image is probabilistic, but the shares have the same size of the secret image, i.e., the schemes have no pixel expansion. To be fair, a first attempt to provide VCS without pixel expansion has been done by Ito et al. in [13]. In both Ito and Yang models, each pixel is reconstructed “OR”ng the corresponding single pixel contained in the shares. Such models are called probabilistic, because they give no absolute guarantee on the correct reconstruction of the original pixel: in some cases, the reconstructed pixel is wrong. This differs from the traditional VCS, which are now called deterministic, where the reconstruction of an “approximation” of the secret pixel is guaranteed. Here the approximation means that a white (black) pixel can be, in some cases, replaced in the reconstructed image by a set of subpixels having a given set of whiteness (blackness). Since in probabilistic models the secret pixel is correctly reconstructed with some probability, the quality of the reconstructed images depends on how big is the probability of correctly reconstructing the secret pixels.
Between deterministic schemes and probabilistic schemes it is possible to set a trade-off. In a deterministic scheme a certain pixel expansion is paid for the guarantee of a correct reconstruction. In a probabilistic scheme a reconstruction with no pixel expansion is paid with a (small) probability of making mistakes in reconstructing the secret image. In some cases it is possible to sacrifice some pixel expansion in order to improve the probabilistic reconstruction of the secret image or vice versa. Yang’s model has been generalized in Cimato et al. [11] showing how it is possible to trade pixel expansion for the probability of a good reconstruction. Such a model can be seen as a generalization of both the classical deterministic model and the probabilistic model introduced by Yang [22]. Moreover, there exists a one-to-one mapping between probabilistic schemes with no expansion and deterministic schemes; such a mapping trades the contrast of the deterministic scheme with the probability factor of the probabilistic scheme. Other proposals in literature have been introduced to deal with non-OR-based vcs and to extend the approach to color and grayscale images.
A formal definition of the probabilistic model has been given in [11], generalizing Yang’s approach and extending the traditional definition of VCS. In the next subsection we review the notions related to traditional VCS, before introducing the definition of probabilistic visual cryptography schemes in subsection 5.2.2
The secret image consists of black and white, where usually white color is interpreted as transparent, so that the superposition of white pixels, let the color of the pixel contained in the other shares pass. In order to share each pixel of the secret image the owner of the secret, usually called the dealer, provides each participant with a share, which is an enlarged version of the secret pixel consisting of a certain number m of subpixels. So the shared version of the original secret pixel will consists of m pixels, which are called subpixels because all together they represent the original secret pixel.
The shares can be conveniently represented with n × m matrices where each row represents one share, i.e., m subpixels, and each element is either 0, for a white subpixel, or 1 for a black subpixel. A matrix representing the shares is called the distribution matrix. Physically, the shares are given out in the form of printed transparencies. Given a distribution matrix M and a set Q of participants, the notation MQ refers to the submatrix of M consisting of only the rows corresponding to participants in Q.
To reconstruct the secret image a group of participants stacks together the shares. Since each secret pixel is represented by m pixels in the shares, the reconstructed image will be bigger than the original (depending on m and on the actual positions of the pixels, the image can also be distorted; a perfect square is a good choice for m because it avoids distortion). Depending on the stacked shares, each secret pixel will be reconstructed with a certain number of black and white subpixels. A reconstructed pixel is considered white if the number of white pixels in its reconstruction is big enough, i.e., the number of black subpixel is less than or equal to a given threshold ℓ, and is considered black if the number of black subpixels is big enough, i.e., greater or equal a given threshold h. Obviously one has to require that ℓ < h. l ℓ and h are called the contrast thresholds of the scheme. In some other papers, the contrast thresholds are used slightly differently: m − h is an upper bound on the number of black subpixels in a white pixel and m − ℓ is a lower bound on the number of black subpixels in a black pixel.
Since a reconstructed pixel has to be either black or white, we consider only schemes such that in the reconstructed image each reconstructed pixel has a number of black pixels, which is either ≤; ℓ or ≥; h. An easy way to resolve ambiguities in the reconstruction is to assume ℓ = h − 1.
We consider threshold schemes where a qualified set of participants consists of k or more participants. For these schemes, a nonqualified set of participants, i.e., a set of less than k participants, will not have any information about the secret image from the shares. Instead, a qualified set of participants, i.e., a set of at least k participants will be able to reconstruct the secret image. The quality of the reconstructed image depends on the scheme.
In a deterministic scheme the quality of the reconstructed image depends on the so-called contrast that is a function of the pixel expansion m, and the contrast thresholds ℓ and h. The contrast of a scheme is defined as γ = (h − ℓ)/m.
In a deterministic scheme it is guaranteed that, for any qualified set of participants, the pixel is reconstructed correctly; that is, if the secret pixel is white then the number of black subpixels in the reconstructed image, corresponding to that secret pixel, is at most ℓ, whereas if the secret pixel is black, the number of black subpixels in the reconstructed pixel is at least h.
In order to provide shares to the participants the dealer chooses uniformly at random a distribution matrix from a collection of matrices CB
Definition 1 Let (ГQual ГQual) be an access structure on a set of n participants. Two collections (multisets) of n × m boolean matrices CW
Any (qualified) set Q ={i2,i2,…, ip} ∈ ГQual can recover the shared image by stacking their transparencies.
Formally, for any M ∈ CW
Any (forbidden) set X = {i2,i2,…, ip} ∈ ГForb has no information on the shared image.
Formally, the two collections of p×m matrices Dt
In many schemes, the collection CW
A scheme is characterized by several parameters: the number of participants n, the threshold k that determines whether a set of participants is qualified to reconstruct the image, the pixel expansion m, and the contrast thresholds ℓ and h, which determine whether a reconstructed pixel is considered white or black.
In a probabilistic scheme the reconstruction property is no more guaranteed, but each pixel can be correctly reconstructed only with a probability given as a parameter of the schema. This means that the distribution matrices must be carefully selected in order to satisfy the above properties. For a probabilistic scheme, as done in [22], it is possible to define the probabilities of (un)correctly reconstructing a (black)white pixel, given a qualified set of participants Q. With pi|j is denoted the probability of having a reconstructed pixel i, given that the corresponding pixel in the secret image was j, where i,j ∈ {b,w}. Then pw|w(Q), denotes the probability of correctly reconstructing a white pixel when superimposing the shares of Q, and pb|w (Q) as the probability of incorrectly reconstructing a white pixel. Notice that pw|w(Q)=z|CW|
The quantities
pb|b(Q)−pb|w(Q)
and
pw|w(Q)−pw|b(Q)
return then a measure of the goodness of the scheme for the given qualified set Q. The bigger the above differences the better is the scheme. If both quantities are equal to 1 for all qualified sets, then the scheme is again a deterministic one, with no possible error in the reconstruction.
If there exists a positive constant β such that for any qualified set Q it holds
pb|b(Q)−pb|w(Q)≥β
and
pw|w(Q)−pw|b(Q)≥β.
then the scheme is called β-probabilistic, meaning that β denotes the possible error in the reconstruction. Notice that when every reconstructed pixel is either white or black, that is, the reconstructed pixel has at most ℓ black subpixels or at least h black subpixels, we have that for any Q,
pw|w(Q)=1−pb|w(Q)
and that
pb|b(Q)=1−pw|b(Q)
and thus,
pw|w(Q)−pw|b(Q)=pb|b(Q)−pb|w(Q).
The value ℓ and h are the thresholds that define the number of subpixels needed to correctly distinguish between a white and black pixel in the reconstructed image. For some scheme, for some qualified set Q, it could be possible to obtain a secret pixel with a number of black subpixels strictly greater than ℓ and strictly less than h, where the reconstructed pixel is neither white nor black. In this case the value pb|b(Q) − pb|w(Q) might be different from pw|w(Q) − pw|b(Q). To avoid such kind of ambiguous situations, it is possible to fix the value ℓ = h − 1, so that the equation pw|w(Q) − pw|b(Q). = pb|b(Q) − pb|w(Q) always holds.
Probabilistic schemes are then characterized by a further parameter: the probabilistic factor β. In the following a probabilistic scheme will be described by all these parameters (that is, β, k, n, ℓ, h, and m) which are referred to as the characteristic parameters of the scheme.
It is now possible to provide the formal definition of a β-probabilistic threshold visual cryptography scheme with characteristic parameters (k, n, ℓ, h, m), for short β-probabilistic (k, n, ℓ, h, m)-VCS. The definition naturally extends also to general access structures.
Definition 2 A β-probabilistic (k, n, ℓ, h, m)-VCS consists of two collections of n × m binary matrices, CW
There exists β > 0, such that for any set Q of exact k participants pb|b(Q) − pb|w (Q) ≥ β and pw|w (Q) − pw|b(Q) ≥ β
For any set Q of strictly less than k participants, the sets CQW={MQ|M∈CW}
Notice that the definition of the scheme requires the reconstruction of a secret pixel (Property 1) to be well defined for qualified sets of exact k participants. This is without loss of generality because if a qualified set has more than k participants one can simply choose k of the shares and use only those k shares to reconstruct the image. Hence in the rest of the chapter a qualified set is assumed to consist of exact k participants.
The goodness of a scheme is measured by the pixel expansion m, the contrast γ = (h − ℓ) /m and by the probabilistic factor β. Notice that for m =1 the above definition is equivalent to the one provided by Yang [22]. Whereas for a big enough m, it is possible to construct schemes with β = 1, and in such a case the above definition is equivalent to the classical definition of a visual cryptography scheme.
If the pixel expansion m is assumed to be a parameter of a scheme, then on one extreme, when m = 1 one gets the probabilistic model with no pixel expansion, and on the other extreme, when m is big enough, one obtains the deterministic model. In between such two extremes it is possible to consider probabilistic models with a given pixel expansion, trading the probability of a good reconstruction with the number of subpixels required to reconstruct each secret pixel.
By restricting the attention on a particular class of probabilistic schemes, it is possible to show that results valid for all the other schemes can be obtained, without loss of generality. The trick is to prove that for a given scheme it is possible to define a similar scheme satisfying well-defined additional properties, without modification on the parameters of the scheme. For this reason canonical β-probabilistic (k, n, ℓ, h, m)-VCS schemes are defined as those schemes that satisfy the following properties:
The cardinality of the collections CW
For any two qualified sets Q1 and Q2 of participants, we have that px|y(Q1) = px|y(Q2), for x ∈ {w, b} and y ∈ {w, b}.
The first lemma says that given a probabilistic scheme S a new scheme S' can be constructed such that the cardinality of CW(S′)
The following lemma is similar to the analogous result proved in Section 2.1 of [1] for deterministic schemes.
Lemma 1 Given a β-probabilistic (k,n, ℓ,h,m)-VCS S, there exists a β-probabilistic (k, n, ℓ, h, m)-VCS S' such that |CW(S′)|=|CB(S′)|
Proof Fix a β-probabilistic (k,n, ℓ,h,m)-VCS S, let r1=|CW(S)| and r2=CB(S)
Since we have only repeated matrices of the collections C
The following lemma shows that schemes can be built where the number of black subpixels in a reconstructed pixel does not depend on the particular qualified set of participants chosen to reconstruct the secret pixel and the characteristic parameters remain the same.
Lemma 2 Given a β-probabilistic (k, n, ℓ, h, m)-VCS S, there exists a β-probabilistic (k,n,ℓ, h, m)-VCS S' such that for any two qualified sets Q1 and Q2 of participants, we have that px|y(Q1) = px|y(Q2), for x ∈ {w, b} and y ∈ {w,b}.
Proof Fixa β-probabilistic (k,n, ℓ,h,m)-VCS S. Consider first CW(S)
Let Q1 and Q2 be two qualified sets. We have that CQ1W(S′)=CQ2W(S′)
By Lemmas 1 and 2, it follows that considering only canonical schemes is without loss of generality, because for any scheme S an equivalent canonical scheme S' having the same characteristic parameters of scheme S can be provided.
In the following only canonical schemes will be considered, remembering that for a canonical scheme px|y(Q1) = px|y(Q2), for x ∈ {w, b} and y ∈ {w, b} and thus we will just write px|y, without specifying the qualified set.
Probabilistic threshold schemes give the possibility to construct a VCS scheme with no pixel expansion, that is having m = 1. In [22] it has been proved that a deterministic scheme S with contrast γ(S) can be transformed into a β-probabilistic scheme S' with β(S') = γ(S) and no pixel expansion. In [11] a complementary result has been proven showing that there is a one-to-one correspondence between the probabilistic model with no pixel expansion and the deterministic one where the contrast is traded for the probabilistic factor. Indeed a β-probabilistic scheme S with no pixel expansion can be transformed into a deterministic scheme S' with contrast γ(S') = β(S). An immediate consequence is that any bound on the contrast of a deterministic scheme is also a bound on the probabilistic factor of probabilistic schemes with no pixel expansion. In the following we report the lemma proving the correspondence between probabilistic schemes with no pixel expansion and deterministic schemes.
The following lemma has been proved in [22] and applies to VCS with basis matrices.
Lemma 3 [22] Let S be a deterministic (k, n, ℓ, h, m)-VCS with base matrices MB and MW. Then, there exists a canonical β-probabilistic (k, n, ℓ', h', 1)-VCS scheme with β = γ(S).
Proof Let S be a deterministic (k, n, ℓ, h, m)-VCS. Construct a probabilistic scheme S', by letting CB(S′) (resp. CW(S′)
We need to prove that S' is a β-probabilistic (k, n, ℓ', h', m')-VCS scheme with ℓ' = ℓ, h' = h, m' = 1 and β = γ(S) = (h − ℓ)/m. Obviously S' has pixel expansion m' = 1.
By the properties of S, we know that when the secret pixel is black the reconstruction in S gives at least h black subpixels, that is pb|b ≥h/m. Obviously this gives pw|b ≥ (m − h)/m. Similarly, we have pw|w ≥ (m − ℓ)/m and pb|w≤ ℓ/m.
Hence, in S' we have that
pw|w−pw|b≥m−ℓm−m−hm=h−ℓm
and
pb|b−pb|w≥hm−ℓm=h−ℓm
and thus we can set β=h−ℓm
Example 1 Consider as starting point the deterministic scheme (3, 4) having basis matrices MW and MB reported below, whose parameters are m = 6, h = 5, ℓ = 4, a = 1/6:
MW=[001110001101001011000111]MB=[110001110010110100111000].
To illustrate the construction, consider the following 16
cW={[0000],[0000],[1110],[1101],[1011],[0111]}cB={[1111],[1111],[0001],[0010],[0100],[1000]}.
Let S be the (n,n, 0, 0, 1)-VCS obtained applying Lemma 3 to scheme SD. For scheme S we have that pb|b = 5/6, pw|b = 1/6, pw|w = 1/3, pb|w = 2/3,β = γ(S) = 1/6.
Lemma 3 shows how starting from a deterministic scheme with base matrices it is possible to obtain a corresponding probabilistic scheme. A more general version of the above lemma we report below has been given in [11] showing the transformation from a general (also with no base matrices) deterministic scheme to a probabilistic one.
Lemma 4 Let S be a deterministic (k,n, ℓ, h,m)-VCS. Then, there exists a canonical β-probabilistic (k, n, 0, 1, 1)-VCS scheme with β = γ(S).
Proof Let S be a deterministic (k,n, ℓ, h,m)-VCS. Construct a probabilistic scheme S', by letting CB
We need to prove that S′ is a β-probabilistic (k, n, ℓ′, h′, m′)-VCS scheme with ℓ′ = 0, h′ = 1 , m''= 1 and β = γ(S) = (h − ℓ)/m. Obviously S' has pixel expansion m' = 1. We set ℓ' = 0 and h' = 1 and we have to prove that this results in a β-probabilistic scheme.
Let r=|CB(S)|
Hence, in S′ we have that pw|w−pw|b≥h−ℓm
For a canonical scheme it is possible to define the characteristic vectors as:
cB=(c0B,c1B,…,cmB)
and
cW=(c0W,c1W,…,cmW)
where CiX
The following lemma complements the results presented above, showing how it is possible to transform a probabilistic (canonical) scheme into a deterministic scheme.
Lemma 5 Let S be a β-probabilistic canonical (k, n, 0,1,1)-VCS and let CB = (C0B,C1B
Proof Let S be a β-probabilistic (k, n, 0, 1, 1)-VCS satisfying the hypothesis of the lemma. Scheme S' is constructed by letting its base matrix MB (resp. Mw) consist of all the vectors of CB(S)
Both CB (S) and CW (S) contain r matrices of dimension n x 1; hence, the dimension of both MB and MW is n × r; thus, m' = r.
Since S is a β-probabilistic scheme, we have that− pb|b ≥ β > 0 hence, pb|b > pb|w, and since = pb|b=c1B/r
Let us consider the security property. Fix a nonqualified set of participants and consider the corresponding k' < k rows of the basis matrices. Each of these rows can be seen as the concatenation of shares of S (one per each matrix in the collections CB(S)
Finally, the contrast of S' is γ(S′)=h′−ℓ′m′=c1B−c1Wr=pb|b−pb|w≥β(S)
As already said, the correspondence between deterministic schemes and probabilistic schemes with no pixel expansion allows the reuse of bounds found on the contrast as bounds on the corresponding probabilistic factor. For example, in [14] it has been proved that the contrast of any deterministic (2, n)-VCS is upper bounded by
γ≤γ∗=4−(k−1)nkn(n−1)⋯(n−(k−1)).(5.1)
As an immediate, the following lemma, which is a corollary of Lemma 5, also holds:
Corollary 6 For any β-probabilistic (2,n, 0, 1,1)-VCS we have that
β≤β∗=4−(k−1)nkn(n−1)⋯(n−(k−1)).
Proof Assume by contradiction that a probabilistic scheme with β > β* exists. By Lemma 5, we can construct a scheme with contrast γ ≥ β. Since β > β* = γ* we get that γ > γ*, contradicting Equation (5.1).
In the above section, the correspondence between deterministic and probabilistic schemes has been stated in Lemma 3 and Lemma 5, showing a trade-off between pixel expansion and probability factor. It shows that by using a large enough pixel expansion we can transform a probabilistic scheme into a deterministic one. Indeed, on one extreme it is possible to have schemes with no pixel expansion, where the reconstruction relies entirely on the probability factor of the scheme. On the other extreme, it is possible to have deterministic schemes, where the reconstruction is guaranteed but a certain pixel expansion is required. In the next section we show how it is possible to stay in between the two extremes, realizing schemes for which the probability factor is traded for the pixel expansion.
Lemma 5 shows the basic technique for the construction of a deterministic scheme with pixel expansion equal to the cardinality r of the collections CB
Construction 1 Let S be a canonical β-probabilistic (k,n, 0, 1, 1)-VCS. Fix 1 < m' ≤ r, where r=|CB(S)|=|CW(S)|
Notice that we also need to fix the contrast thresholds ℓ' and h' of the new scheme S'. There can be several valid choices.
To illustrate the construction, consider the following 1/3-probabilistic (2, 3,0,1,1)-VCS S.
cB={[100],[010],[001]}cW={[111],[000],[000]}.
For such a scheme, the parameters are pb|b = 2/3 and pb|w = 1/3.
If m' = 2 is fixed, a 3-probabilistic (2, 3, •, •, 2)-VCS is obtained by applying Construction 1 to scheme S:
cB={[100100],[100001],[001001],[011000],[010010],[000110]}cW={[101010],[101010],[000000],[010101],[010101],[000000]}.
The thresholds of S' can be selected in different ways returning in every case a 13
The matrices MB and Mw consisting of all the columns of CB
Construction 1 starts from probabilistic schemes with no pixel expansion. Using Lemma 3 or Lemma 4 a probabilistic scheme with no pixel expansion can be obtained starting from a deterministic scheme. Hence, probabilistic schemes with pixel expansion can be constructed by starting from a deterministic scheme, applying first Lemma 3 and then Construction 1.
The probabilistic schemes obtained with Construction 1 satisfy the security property. Indeed, consider a nonqualified set Q of participants and let CQW(S)
In this section, a formula for the probabilities of the scheme built with Construction 1 as a function of the probabilities of the starting scheme is provided. Let S be a canonical probabilistic scheme with no pixel expansion and let pb|b, pb|w, pw|b and pw|w be the probabilities of S.
Fix an m' and build a probabilistic scheme with pixel expansion m' using Construction 1. Fix also a threshold ℓ', 0 ≤ ℓ' < m'. Fixing ℓ' also gives h' = ℓ' + 1. Notice that, even with this restriction, not all choices of ℓ' will result in valid schemes. Let r be the cardinality of the collections CW
The cardinality of the collections C′W
Fix a qualified set Q of participants. To compute p′b|b(Q)
m′!(r⋅pb|bz) (r−r⋅pb|bm′−z)
because z vectors can be selected from the r • pb|b vectors that yield a reconstructed black subpixel, and m' − z vectors from the r − r • pb| b ones that yield a reconstructed white subpixel. Hence, z is constrained by 0 ≤ z < r • pb| b and 0 ≤ m' − z ≤ r − r • pb|b, which implies that binomial coefficients are defined. (By definition (00)=1
p′b|b(Q)=∑m′z=h′(r⋅pb|bz)(r−r⋅pb|bm′−z)(rm′)(5.2)
and similarly
p′b|w(Q)=∑m′z=h′(r⋅pb|wz)(r−r⋅pb|wm′−z)(rm′)(5.3)
p′w|w(Q)=∑ℓ′z=0(r−r⋅pw|wz)(r⋅pw|wm′−z)(rm′)(5.4)
p′w|b(Q)=∑ℓ′z=0(r−r⋅pw|bz)(r⋅pw|bm′−z)(rm′).(5.5)
Since from Equations 5.2–5.5, probabilities of S' do not depend on the particular qualified set Q, it is possible to conclude that S' is canonical.
The construction previously described can be applied for the construction of novel probabilistic schemes. The starting point however is the selection of a particular deterministic scheme that determines the parameters of the resulting scheme. Obviously, by changing the selected scheme, diferent probabilistic schemes are obtained. In the next sections we will describe some probabilistic schemes for the (n, n) and the (2, n) cases starting from two selected deterministic schemes. In the first case a simple formula for the probabilistic factor can be obtained, relating β to the pixel expansion of the resulting scheme, while in the second case, the computation of the parameters results is more complicated and depends on the selected pixel expansion of the new scheme.
In this section a (n, n)-threshold probabilistic schemes with any pixel expansion is built, for n ≥ 2 starting from deterministic scheme SD, which is the (n, n)-threshold deterministic scheme of Naor and Shamir [16]. SD has pixel expansion m = 2n−1, and thresholds ℓ = m − 1 and h = m. Moreover, the scheme consists of a white base matrix containing all vectors with an even (including 0) number of black subpixels and a black base matrix containing all vectors with an odd number of black subpixels. For example, for n = 4 the scheme SD is given by:
MW=[01110001010011010010101100010111]MB=[00011110001011010100101110000111].
Let S be the (n, n, 0,0,1)-VCS obtained applying Lemma 3 to scheme SD. For scheme S we have that the cardinality of the collections CB and CW is r = 2n−1, and that pb|b = 1, pw|b = 0, pw|w = 1/2n−1, pb|w = 1 − 1/2n−1.
cB={[0000],[1100],[1010],[1001],[0110],[0101],[0011],[1111]}
cW={[0001],[0010],[0100],[1000],[1110],[1101],[1011],[0111]}.
Fix an m′, 2 ≤ m′ ≤ r, and let S′ be the probabilistic scheme with pixel expansion m′ obtained using Construction 1 from scheme S. The threshold ℓ′ for S′ also needs to be selected, remembering also that the threshold ℓ′ will be obtained if the assumption h′ = ℓ′ + 1 is satisfied. Observe that ℓ′ must be m′ − 1 because there is only one column with all white pixels and thus it would be never possible to get more than 1 white subpixel in a reconstructed pixel (equivalently always at least m′ − 1 black subpixels in a reconstructed pixel will be obtained). This implies that if by selecting ℓ′ < m′ − 1 all reconstructed pixels will always be considered black and thus no valid scheme can be obtained. To construct schemes, values ℓ′ = m′ − 1 and h′ = m′ must be selected.
To compute the probabilistic factor of scheme S′ it is necessary to compute p′b|b
p′b|w=(r−1m′)/(rm′)=1−m′/r
and
p′w|w=m′/r
The formula expressing the probability factor of S′ is then the following:
β=m′2n−1.
The formula shows that there is a linear relation between the pixel expansion of the scheme and the probability factor. A probabilistic scheme with no pixel expansion implies a small probability factor ( β = 1/r) and then a reconstructed image with many errors; the probability factor of the scheme can be increased by increasing the pixel expansion to obtain a better reconstructed image. Clearly for m′ = 2n−1 one would get β =1, that is, a deterministic scheme.
In this section a (2, n)-threshold probabilistic scheme with pixel expansion, for n ≥ 3 is provided, starting from the (2, n)-threshold deterministic scheme SD described in [7]. Recall that SD has pixel expansion m=(n⌊n2⌋)
For example, for n = 4, scheme SD has m = 6, ℓ =3, and h = 5 and is given by:
MW=[111000111000111000111000]MB=[111000100110010101001011].
Let S be the (2, n, 0, 0,1)-VCS obtained applying Lemma 3 to scheme SD. Scheme S is a canonical scheme, and the cardinality of the collections CB and CW is r = m. The values of the probabilities are pb∣b = h/m, pw∣b = 1 − h/m, pb| w = ℓ/m, pw|w = 1 − ℓ/m. Since S is canonical the scheme S′ obtained with Construction 1 is canonical. The value of the pixel expansion m′ can be arbitrarily fixed between 1 and r.
Consider the case of m′= 2. For such a value of m′ there are only two possible choices for the thresholds: ℓ′ = 0, h′= 1 or ℓ′ = 1 , h′ = 2. It is easy to see from the structure of MW and MB that the following two properties hold:
PW: For any set Q of two participants, the matrix MQW
PB: For any set Q of two participants, the matrix MQB
Let us now determine the parameters of the resulting scheme in the two considered cases.
Case ℓ′ = 0, h′ = 1.
To compute p′b|b
To compute P′b|w
Hence, for the (2, n)-threshold scheme obtained by choosing ℓ′ = 0 the probabilistic factor is:
β0=(m−ℓ)(m−ℓ−1)−s(s−1)m(m−1).
Case ℓ′ = 1,h′ = 2.
To compute p′b|b
To compute p′b|w
Hence, for the (2, n)-threshold scheme obtained by choosing ℓ′ = 1 the probabilistic factor is:
β1=(m−s)(m−s−1)−ℓ(ℓ−1)m(m−1).
Compare now the value of β for the above two cases trying to figure out whether one case is better than the other, i.e., the probabilistic factor is bigger and a better quality image is reconstructed. It is possible to express the difference β1 − β0 as
β1−β0=ψm(s)−ψm(ℓ)m(m−1)
where ψm(x) = (m − x)(m − x − 1)+ x(x − 1). The first and second derivatives of ψ with respect to x are ∂2ψm∂x=4x−2m
In the case of any m′ Equations (5.2)–(5.5) can be used to compute the probabilities of probabilistic schemes, over all choices of ℓ′ and h′. Table 5.1 gives the resulting values of the probabilistic factor β of S′ over all possible choices of ℓ′ and m′, for the case of n. Since for n = 3 scheme SD has m = 3 clearly for m′ = 3 we get a deterministic scheme; such a scheme is obtained for ℓ′ = 1, h′ = 2. It is worth to notice that for other choices of ℓ′ the probabilistic factor of the scheme is 0 meaning that no probabilistic scheme with pixel expansion m′ = 3 can be constructed with Construction 1. For the case of m′ = 2 ℓ′ = 1 and ℓ′ = 2 are valid choices and they both yield a 13
Table 5.1 Values of β for scheme S′ for n = 3. The max over each row is in boldface.
m′ℓ′,h′ | 0,1 | 1,2 | 2,3 |
1 | 1/3 | - | – |
2 | 1/3 | 1/3 | – |
3 | 0 | 1 | 0 |
Table 5.2 Values of β for n = 4. The max over each row is in boldface.
Table 5.2 gives the resulting values of the probabilistic factor β of S′ over all possible choices of ℓ′ and m′, for the case of n = 4. Notice that for n = 4 scheme SD has m = 6, hence, for m′ = 6 deterministic schemes can be obtained (in this case both ℓ′ = 3 and ℓ′ = 4 yield a deterministic scheme). As reported in the table, also for m′ = 5 a deterministic scheme can be obtained by choosing ℓ′ = 3. For the other possible choices of m′, the table shows in boldface the biggest probabilistic factor β found.
Finally, Table 5.3 gives the resulting values of the probabilistic factor β of S′ over all possible choices of ℓ′ and m′, for the case of n = 5. For n = 5 scheme SD has m = 10, hence, m′ can range from 2 to 10. As reported in the table, a deterministic schemes is obtained from m′ = 8 (in such a case, by choosing ℓ′ = 4). Again the best probabilistic factor found is reported in boldface.
Table 5.3 Values of β for n = 5. The max over each row is in boldface and ϵ1 and ϵ2 denote very small values.
One of the peculiar characteristics of VCS is the fact that the reconstruction of the secret image is done via the human visual system. This means that representing a black pixel as ‘1’ and the white pixel as ‘0,’ the reconstruction is performed via an ”OR” operation of the superposed pixels contained in the shares. Relaxing such an assumption, it is possible to obtain diferent classes of VCS where the secret pixel is reconstructed after performing diferent boolean operations on the subpixels contained in the shares. For example XOR-based VCS have been proposed in [17]. As regards probabilistic VCS, several proposals have been done [20, 18, 8], where the basic operation for the reconstruction is no more based on the OR of the shared subpixels, and both the distribution and the reconstruction phases are consequently modified.
In [20], Wang et al. proposed a probabilistic (2, n)-VCS based on binary XOR and AND operations, denoted with ⊗ and &, respectively. The construction is given in Figure 5.3.
FIGURE 148.5
A construction for (2,n) Boolean probabilistic VCS.
In Wang’s scheme, a reverse coding of the pixel is adopted, assigning ‘0’ to black pixel and ‘1’ to white pixels. In this scheme it is easy to see that a black pixel in the secret image will be always mapped to a black pixel in each of the computed shares Ai because of the AND operation performed in the computation of the Cj (for a ‘0’ pixel, Cj = Bj&0 = 0) and the XOR operation in the reconstruction phase (the contribution for Cj = 0 means that Aj = Bn+1 ⊕ Cj = Bn+1 and then A′ = Aj ⊕ Ak = Bn+1 ⊕ Bn+1 = 0). The probabilities of reconstructing a black pixel are then pb|b = 1 and pw|b = 0. A white pixel will be reconstructed on the basis of the result of the XOR operation performed on the two matrices Bi and Bk, which are randomly selected. Then pw|w = pb|w = 1/2. Hence, the construction returns a β = 1/2 probabilistic scheme with contrast 1/2.
The above presented scheme has been modified by Ulutas et al. in [18] and Chang et al. in [8]. In the first work the construction is modified by adding a mechanism to augment the probability of selecting a white (black) pixel given that a white (black) pixel was present in the secret image. Basically, matrices Bi are no more randomly generated as in Wang’s scheme, but are selected in two different sets, one for white pixels and the other for black pixels, in order to maximize the probability of reconstructing a pixel of the right color. Then a random matrix R of the same size of the secret image is generated and used to compute the share. The reconstruction phase is not modified. The modified scheme is given in Figure 5.2.
In Chang et al’s construction, a voting strategy is adopted to apply the Wang method to grayscale images [8]. In such a method, for each original pixel, the binary representation of its grayscale value is considered, and for each bit composing the representation, the Wang scheme is executed and repeated 2m + 1 times in the generation phase. In the reconstruction phase, the voting method is used to recover the best result out of the shared bits in order to restore the original grayscale value of the pixel.
FIGURE 5.2
Ulutas et al. [18] construction for (2,n) Boolean probabilistic VCS.
A construction similar to the one above described, was proposed by Wang also for a (n,n) probabilistic VCS. The construction is given in Figure 9.6
FIGURE 5.3
A construction for (n, n) Boolean probabilistic VCS.
In such a scheme it is easy to see that a black pixel in the secret image will be always mapped to a black pixel in each of the computed shares Ai because of the and operation performed in the computation of the Cj (for a ’0’ pixel, Cj = Bj & 0 = 0) and the XOR operation in the reconstruction phase (the contribution for Cj = 0 means that Aj = Bn+1 ⊕ Cj = Bn+1 and then A′ = Aj ⊕ Ak = Bn+1 ⊕ Bn+1 = 0. Then pb∣b, = 1 and pw∣b = 0. A white pixel will be reconstructed according to the pixel returned after the XOR between the two matrices Bi and Bk, which are randomly selected. Then pw∣w = pb∣w = 1/2. Hence, the construction returns a β =1/2 probabilistic scheme with contrast 1/2.
The same construction has been extended by Wang et al. in [21] to deal with grayscale images. Basically each pixel is coded with a binary string g − 1 bits long, where g denotes the gray level number, and having a number of ”1”s equivalent to the 1s present in the binary string obtained by the grey level g (without respecting the order). A pixel having grey level k in a range from 0 to g − 1, is represented by a binary string having g − k ’0’s and k − 1 ’1’s. The construction returns a probabilistic scheme with m = g − 1.
The probabilistic model for VCS schemes has been first described in Yang [22], where the reconstruction of the secret pixel has been given in probabilistic terms, no more guaranteeing the correctness property of the traditional VCS schemes. A generalization of the model has been given then in [11], where probabilistic schemes with pixel expansion have been described, showing that there is a one-to-one correspondence between probabilistic schemes with no pixel expansion and deterministic schemes and that such a one-to-one mapping trades the probabilistic nature of the scheme with the contrast of the deterministic scheme. Probabilistic schemes with pixel expansion can be obtained from deterministic schemes and their probabilistic factors can be studied. While for (n, n)-threshold schemes it has been proved that there is a linear relation between the pixel expansion and the probabilistic factor, for (2, n)-threshold schemes no closed expression for the probabilistic factor has been found. Finally, a probabilistic model has been extended and alternative operations (instead of OR) have been considered for the distribution of the shares and the reconstruction of the secret images.
[1] Ateniese G., Blundo C., De Santis A., and Stinson D. R. (1996). Visual cryptography for general access structures. Information and Computation, 129, 86–106.
[2] Ateniese G., Blundo C., De Santis A., and Stinson D. R. (1996). Constructions and bounds for visual cryptography. Proceedings of ICALP 1996, Paderbon, Germany, 8–12 July, pp. 416–428, Springer Verlag LNCS 1099.
[3] Ateniese G., Blundo C., De Santis A., and Stinson D. R. (2001). Extended schemes for visual cryptography. Theoretical Computer Science, 250, 143–161.
[4] Blundo C., D’Arco P., De Santis A., and Stinson D. R. (2003). Contrast optimal threshold visual cryptography schemes. SIAM J. on Discrete Mathematics, 16, 224–261.
[5] Blundo C., De Bonis A., and De Santis A. (2001). Improved schemes for visual cryptography. Designs, Codes, and Cryptography, 24, 255–278.
[6] Blundo C. and De Santis A. (1998). Visual cryptography schemes with perfect reconstruction of black pixels. Journal for Computers & Graphics, 22, 449–455.
[7] Blundo C., De Santis A., and Stinson D. R. (1999). On the contrast in visual cryptography schemes. Journal of Cryptology, 12, 261–289.
[8] Chang C., Lin C., Le T.H., and Le H.B. (2008). A probabilistic visual secret sharing scheme for grayscale images with voting strategy. Proceedings of the International Symposium on Electronic Commerce and Security, 2008, pp. 184–188.
[9] Cimato S., De Prisco R., and De Santis A. (2004). Colored visual cryptography without color darkening. In Proceedings of the 4th Conference on Security in Communication Networks, Amalfi, Italy, 8–10 September, pp. 236–251, Springer Verlag LNCS 3352.
[10] Cimato S., De Prisco R. and De Santis A. (2005), Optimal colored threshold visual cryptography schemes. Designs, Codes and Cryptography, 35, 311–335.
[11] Cimato S., De Prisco R., and De Santis A. (2006). Probabilistic visual cryptography schemes. The Computer Journal, 49(1), 97–107.
[12] Hofmeister T., Krause M. and Simon H. U. (2000). Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theoretical Computer Science, 240, 471–485.
[13] Ito R., Kuwakado H., and Tanaka H. (1999). Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E82A(10), 2172–2177.
[14] Krause M. and Simon H. U. (2003). Determining the optimal contrast for secret sharing schemes in visual cryptography. Combinatorics, Probability and Computing, 12, 285–299.
[15] Kuhlmann C. and Simon H. U. (2000). Construction of visual secret sharing schemes with almost optimal contrast. Proceedings of the 11th ACM-SIAM Symposium on Discrete Algorithms, San Francisco, USA, 9–11 January, pp. 262–272.
[16] Naor M. and Shamir A. (1994). Visual cryptography. Proceedings of Eurocrypt 94, Perugia, Italy, May 9–12, pp. 1–12, Springer Verlag LNCS 950.
[17] Tuyls P., Hollmann H.D.L., van Lint J.H., and Tolhuizen L. (2005). XOR-based visual cryptography schemes. Designs, Codes, and Cryptography, 37, 169–186.
[18] Ulutas M., Nabiyev V.V., Ulutas G., and Shamir A. (2009). A PVSS scheme based on Boolean operations with improved contrast. Proceedings of International Conference on Network and Service Security, Paris, 2009, pp. 1–5.
[19] Verheul E. R. and van Tilborg, H.C.A. (1997). Constructions and properties of k out of n visual secret: Sharing schemes. Designs, Codes, and Cryptography, 11, 179–196.
[20] Wang D., Zhang L., Ma N., and Li X. (2006). Two secret sharing schemes based on Boolean operations. Pattern Recognition 40(10), 2776–2785
[21] Wang D., Li X., Yi F., Daoshun Wang, Xiaobo, Li, and Feng, Yi (2007). Probabilistic (n, n) visual secret sharing scheme for grayscale images. In Information Security and Cryptology, Lecture Notes in Computer Science, Vol. 4990. Springer-Verlag, Berlin, pp. 192–200
[22] Yang C.N. (2004). New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters, 25, 481–494.
[23] Yang C.N. and Chen T.S. (2005). Size-adjustable visual secret sharing schemes. IEEE Trans. Fundamentals, 88, 2471–2474.
[24] Yang C.N. and Chen T.S. (2005). Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recognition Letters, 26, 193–206.
[25] Yang C.N. and Laih C.S. (2000). New colored visual secret sharing schemes. Designs, Codes, and Cryptography, 20, 325–335.
3.140.198.173