Home Page Icon
Home Page
Table of Contents for
Title Page
Close
Title Page
by Ching-Nung Yang, Stelvio Cimato
Visual Cryptography and Secret Image Sharing
Cover
Half Title
Title Page
Copyright Page
Dedication
Table of Contents
List of Figures
List of Tables
Preface
Contributors
1 Visual Cryptography from Halftone Error Diffusion
1.1 Introduction
1.1.1 Visual Cryptography
1.1.2 Halftone Visual Cryptography
1.1.3 Blue Noise Error Diffusion
1.2 Visual Secret Sharing
1.2.1 Notion and Formal Definitions
1.2.2 Construction of VSS Scheme
1.3 Halftone VSS Construction Using Error Diffusion
1.3.1 Share Structure
1.3.2 Distribution of SIPs and ABPs
1.3.3 Generation of Halftone Shares via Error Diffusion
1.4 Halftone VSS Construction Using Parallel Error Diffusion
1.5 Quality of Halftone Shares
1.6 Discussion
1.6.1 Improvement of Image Quality
1.6.2 Comparison with Other Methods
1.6.3 Image Decoding
1.7 Simulation Results
1.8 Conclusion
Bibliography
2 Visual Cryptography for Color Images
2.1 Introduction
2.2 Color Superposition
2.2.1 Color Vision and Color Models
2.2.2 Lattices
2.2.3 The Darkening Problem
2.2.4 The Annihilator Color
2.2.5 The Identity Color
2.3 Formal Models for Colored VCS
2.3.1 The Models for B&W-VC
2.3.2 The Models for Color-VC
2.3.3 The SC, ND, and General Models
2.3.4 Base Matrices
2.4 Schemes for the SC Model
2.4.1 The VV Schemes
2.4.2 The BDD Schemes
2.4.3 The KY and YL Schemes
2.4.4 The CDD Schemes and a Lower Bound
2.5 Schemes for the ND Model
2.6 Schemes for the General Model
2.6.1 (2,2)-Threshold Schemes
2.6.2 The (2, n)-Threshold AS Schemes
2.7 Other Schemes
2.8 Conclusions
Bibliography
3 Visual Cryptography for Multiple Secrets
3.1 Introduction
3.2 Naor and Shamir’s Basic Visual Secret Sharing Scheme
3.3 Visual Two-Secret Sharing Schemes
3.3.1 Wu and Chen’s Scheme
3.3.2 Wu and Chang’s Scheme
3.4 Visual Multiple-Secret Sharing Schemes
3.4.1 Shyu et al.’s Scheme
3.4.1.1 Informal Description
3.4.1.2 Encoding Circle Share A
3.4.1.3 Encoding Circle Share B
3.4.1.4 General Algorithm
3.4.2 Feng et al.’s Scheme
3.4.3 Experimental Results
3.4.4 Comparison and Discussions
3.5 Concluding Remarks
Bibliography
4 Extended Visual Cryptography for Photograph Images
4.1 Introduction
4.2 Basic Visual Cryptography Schemes
4.2.1 (k,n) Visual Secret Sharing Schemes
4.2.2 Extended Visual Cryptography Scheme
4.2.3 Random Grids
4.3 Fundamentals of Photograph Visual Cryptography
4.3.1 Digital Halftoning
4.3.2 Image Quality and Related Parameters
4.3.3 Photograph Visual Cryptography with Basic Schemes
4.4 Variations of Photograph Visual Cryptography
4.4.1 Approaches to Photograph Visual Cryptography
4.4.2 Random-Dot Shadow Images
4.4.3 Similar Shadow Images
4.4.4 Positive and Negative Shadow Images
4.4.5 Error and Secret Diffusion
4.4.6 Simultaneous Iterative Search
4.4.7 Tone Adjustment
4.4.8 Continuous-Tone Subpixel
4.5 Misalignment-Tolerant Photograph Visual Cryptography
4.5.1 Theory and Implementation
4.5.2 Results
4.6 Conclusions
Bibliography
5 Probabilistic Visual Cryptography Schemes
5.1 Introduction
5.2 Visual Cryptography Schemes
5.2.1 The Deterministic Model
5.2.2 The Probabilistic Model
5.3 Canonical Probabilistic Schemes
5.4 Probabilistic Schemes with No Pixel Expansion
5.5 Trading Pixel Expansion with Probabilities
5.5.1 Probabilistic Schemes with Given Pixel Expansion
5.6 Constructing Probabilistic Schemes
5.6.1 (n, n)-Threshold Probabilistic Schemes with Any Pixel Expansion
5.6.2 (2, n)-Threshold Probabilistic Schemes with Any Pixel Expansion
5.7 Probabilistic Schemes with Boolean Operations
5.7.1 (2, n) Scheme for Binary Images (Wang)
5.7.2 (n, n) Scheme for Binary Images (Wang)
5.8 Conclusions and Open Problems
Bibliography
6 XOR-Based Visual Cryptography
6.1 Introduction
6.2 Preliminaries
6.3 Visual Cryptography Scheme Using the Polarization of Light
6.3.1 (2, n) Scheme
6.3.2 (n, n) Scheme
6.3.3 (k, n) Scheme
6.4 Visual Cryptography Scheme with Reversing
6.4.1 (k, n) VC Scheme Using Cyclic-Shift Operation
6.4.2 A Scheme for General Access Structure
6.5 Secret Sharing Scheme Using Boolean Operation
6.5.1 (2, n) Scheme
6.5.2 (n, n) Scheme
6.5.3 (k, n) Scheme
6.6 Conclusion
Bibliography
7 Visual Cryptography and Random Grids
7.1 Introduction
7.2 Random Grids
7.2.1 Random Pixel, Random Grid, and Average Light Transmission
7.2.2 Superimposition of Random Grids
7.3 Visual Cryptograms of Random Grids
7.3.1 Definition of VCRG
7.3.2 (2, 2)-VCRG Algorithms for Binary Images
7.3.3 Experiments for (2, 2)-VCRG
7.3.4 Definition of Light Contrast and Performance Evaluation
7.3.5 Algorithms of (n, n)-VCRG for Binary Images
7.3.6 Algorithms of (n, n)-VCRG for Gray-Level and Color Images
7.3.7 Experiments for (n, n)-VCRG
7.4 Concluding Remarks
Bibliography
8 Visual Cryptography and Contrast Bounds
8.1 Introduction
8.2 Preliminaries
8.3 Approximate Inclusion Exclusion
8.4 Designs and Codes
8.5 Optimal 3-out-of-n Schemes
8.6 Asymptotic Optimal k-out-of-n Schemes
8.7 Contrast Trade-Offs for Extended Visual Cryptography Schemes
8.8 Enhancing the Contrast by Nonstandard Models
8.9 Conclusion
Bibliography
9 Visual Cryptography Schemes with Reversing
9.1 Introduction
9.2 Visual Cryptography Schemes
9.2.1 (k, k)-Threshold Visual Cryptography Schemes
9.2.2 Perfect Black Visual Cryptography Schemes
9.3 Almost Ideal Contrast VCS with Reversing
9.4 Ideal Contrast VCS with Reversing
9.4.1 A Construction Using a Binary Secret Sharing Scheme
9.4.2 Constructions Using Perfect Black VCSs
9.4.2.1 The Scheme by Cimato, De Santis, Ferrara, and Masucci
9.4.2.2 The Scheme by Hu and Tzeng
9.4.2.3 The Scheme by Yang, Wang, and Chen
9.4.2.4 Comparisons
9.4.3 A Construction Using a Nonperfect Black VCS
9.5 Conclusions
Bibliography
10 Cheating Prevention in Visual Cryptography
10.1 Introduction
10.2 Preliminaries
10.2.1 Visual Cryptography
10.2.2 Cheating in VC
10.3 Cheating Prevention Schemes
10.3.1 HCT1 and HCT2
10.3.2 HT
10.3.3 TCH
10.3.4 PS1 and PS2
10.4 Analysis of Cheating Prevention Schemes
10.5 Conclusions
Bibliography
11 Resolving the Alignment Problem in Visual Cryptography
11.1 Introduction
11.2 Preliminaries
11.3 Misalignment with Integer Number of Subpixels
11.4 Misalignment with Less Than One Subpixel
11.4.1 Shares with Slightly Misalignment Can Still Recover the Secret Image
11.4.2 Large Subpixels Have Better Misalignment Tolerance
11.5 A Misalignment Tolerant VCS
11.5.1 The Algorithm
11.5.2 Simulations
11.6 Conclusions and Discussions
11.7 Acknowledgments
Bibliography
12 Applications of Visual Cryptography
12.1 Introduction
12.2 Trojan-Secure Confirmation of Transactions
12.3 Trojan-Secure Authentication Using a PIN
12.4 Security versus Multiple Use
12.5 Using Refraction
12.6 Technical Problems Concerning Adjustment and Parallaxes
12.7 Voting with a Receipt Based on visual cryptography
12.8 Conclusion
Bibliography
13 Steganography in Halftone Images
13.1 Introduction
13.2 A Review of Error Diffusion
13.3 Data Hiding by Stochastic Error Diffusion (DHSED)
13.4 Data Hiding by Conjugate Error Diffusion (DHCED) 359
13.5 Performance Analysis
13.6 Summary
Bibliography
14 Image Secret Sharing
14.1 Introduction
14.2 State of the Art
14.3 Approaches for Image Sharing
14.3.1 Shamir’s Secret Sharing Scheme
14.3.2 Color Image Sharing Based on the Lagrange Interpolation
14.3.3 Color Image Sharing Based on Moving Lines
14.3.4 Improved Algorithm
14.4 Experiment and Evaluation
14.5 Conclusion
Bibliography
15 Polynomial-Based Image Sharing
15.1 Introduction
15.2 Polynomial-Based Sharing Scheme
15.2.1 Shamir’s Secret Sharing Scheme
15.2.2 Lagrange Interpolation Scheme
15.3 Preliminaries and Related Works
15.3.1 Thien-Lin Scheme
15.3.2 Lin-Tsai Scheme
15.3.3 Yang et al.’s Scheme
15.3.4 Inverted Pattern LSB Scheme
15.3.5 Scalable Secret Image Sharing
15.4 Wang et al.’s Scheme
15.4.1 Secret Image Sharing
15.4.2 Set-Up Authentication
15.4.3 Main Algorithms
15.5 Experimental Results
15.5.1 Fidelity Analysis
15.5.2 Evaluating Authentication
15.6 Conclusions
Bibliography
16 Image Sharing with Steganography and Authentication
16.1 Introduction
16.2 Related Work
16.2.1 Lin and Tsai’s Scheme
16.2.2 Yang et al.’s Scheme
16.2.3 Chang et al.’s Scheme
16.3 Adopted Techniques in the Proposed Scheme
16.3.1 Error Diffusion Technique
16.3.2 Interpolation Technique
16.3.3 Canny Edge Detector
16.3.4 Edge Lookup Inverse Halftoning Technique
16.3.5 Shamir Scheme for Secret Sharing
16.4 Proposed Scheme
16.4.1 Sharing and Embedding Phase
16.4.2 Reconstruction and Verifying Phase
16.5 Experimental Results
16.6 Conclusions
Bibliography
17 Two-Decoding-Option Image Sharing Method
17.1 Introduction
17.2 Preliminaries
17.2.1 PISSS
17.2.2 VCS
17.3 Previous Works
17.3.1 Jin et al.’s TiOISSS
17.3.2 Lin and Lin’s TiOISSS
17.4 A New (k, n)-TiOISSS
17.4.1 Design Concept
17.4.2 The Lossless TiOISSS
17.5 Experimental Results and Comparisons
17.6 Conclusion
Bibliography
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Half Title
Next
Next Chapter
Copyright Page
VISUAL
CRYPTOGRAPHY
AND SECRET IMAGE SHARING
EDITED BY
STELVIO CIMATO
CHING-NUNG YANG
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset