1 Visual Cryptography from Halftone Error Diffusion
Gonzalo R. Arce, Zhongmin Wang, and Giovanni Di Crescenzo
1.1.2 Halftone Visual Cryptography
1.1.3 Blue Noise Error Diffusion
1.2.1 Notion and Formal Definitions
1.2.2 Construction of VSS Scheme
1.3 Halftone VSS Construction Using Error Diffusion
1.3.2 Distribution of SIPs and ABPs
1.3.3 Generation of Halftone Shares via Error Diffusion
1.4 Halftone VSS Construction Using Parallel Error Diffusion
1.5 Quality of Halftone Shares
1.6.1 Improvement of Image Quality
1.6.2 Comparison with Other Methods
2 Visual Cryptography for Color Images
Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis
2.2.1 Color Vision and Color Models
2.3 Formal Models for Colored VCS
2.3.3 The SC, ND, and General Models
2.4.4 The CDD Schemes and a Lower Bound
2.6 Schemes for the General Model
2.6.2 The (2, n)-Threshold AS Schemes
3 Visual Cryptography for Multiple Secrets
Shyong Jian Shyu
3.2 Naor and Shamir’s Basic Visual Secret Sharing Scheme
3.3 Visual Two-Secret Sharing Schemes
3.4 Visual Multiple-Secret Sharing Schemes
3.4.1.2 Encoding Circle Share A
3.4.1.3 Encoding Circle Share B
3.4.4 Comparison and Discussions
4 Extended Visual Cryptography for Photograph Images
Yasushi Yamaguchi
4.2 Basic Visual Cryptography Schemes
4.2.1 (k,n) Visual Secret Sharing Schemes
4.2.2 Extended Visual Cryptography Scheme
4.3 Fundamentals of Photograph Visual Cryptography
4.3.2 Image Quality and Related Parameters
4.3.3 Photograph Visual Cryptography with Basic Schemes
4.4 Variations of Photograph Visual Cryptography
4.4.1 Approaches to Photograph Visual Cryptography
4.4.2 Random-Dot Shadow Images
4.4.4 Positive and Negative Shadow Images
4.4.5 Error and Secret Diffusion
4.4.6 Simultaneous Iterative Search
4.4.8 Continuous-Tone Subpixel
4.5 Misalignment-Tolerant Photograph Visual Cryptography
4.5.1 Theory and Implementation
5 Probabilistic Visual Cryptography Schemes
Stelvio Cimato, Roberto De Prisco, and Alfredo De Santis
5.2 Visual Cryptography Schemes
5.3 Canonical Probabilistic Schemes
5.4 Probabilistic Schemes with No Pixel Expansion
5.5 Trading Pixel Expansion with Probabilities
5.5.1 Probabilistic Schemes with Given Pixel Expansion
5.6 Constructing Probabilistic Schemes
5.6.1 (n, n)-Threshold Probabilistic Schemes with Any Pixel Expansion
5.6.2 (2, n)-Threshold Probabilistic Schemes with Any Pixel Expansion
5.7 Probabilistic Schemes with Boolean Operations
5.7.1 (2, n) Scheme for Binary Images (Wang)
5.7.2 (n, n) Scheme for Binary Images (Wang)
5.8 Conclusions and Open Problems
6 XOR-Based Visual Cryptography
Daoshun Wang and Lin Dong
6.3 Visual Cryptography Scheme Using the Polarization of Light
6.4 Visual Cryptography Scheme with Reversing
6.4.1 (k, n) VC Scheme Using Cyclic-Shift Operation
6.4.2 A Scheme for General Access Structure
6.5 Secret Sharing Scheme Using Boolean Operation
7 Visual Cryptography and Random Grids
Shyong Jian Shyu
7.2.1 Random Pixel, Random Grid, and Average Light Transmission
7.2.2 Superimposition of Random Grids
7.3 Visual Cryptograms of Random Grids
7.3.2 (2, 2)-VCRG Algorithms for Binary Images
7.3.3 Experiments for (2, 2)-VCRG
7.3.4 Definition of Light Contrast and Performance Evaluation
7.3.5 Algorithms of (n, n)-VCRG for Binary Images
7.3.6 Algorithms of (n, n)-VCRG for Gray-Level and Color Images
7.3.7 Experiments for (n, n)-VCRG
8 Visual Cryptography and Contrast Bounds
Andreas Klein
8.3 Approximate Inclusion Exclusion
8.5 Optimal 3-out-of-n Schemes
8.6 Asymptotic Optimal k-out-of-n Schemes
8.7 Contrast Trade-Offs for Extended Visual Cryptography Schemes
8.8 Enhancing the Contrast by Nonstandard Models
9 Visual Cryptography Schemes with Reversing
Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci
9.2 Visual Cryptography Schemes
9.2.1 (k, k)-Threshold Visual Cryptography Schemes
9.2.2 Perfect Black Visual Cryptography Schemes
9.3 Almost Ideal Contrast VCS with Reversing
9.4 Ideal Contrast VCS with Reversing
9.4.1 A Construction Using a Binary Secret Sharing Scheme
9.4.2 Constructions Using Perfect Black VCSs
9.4.2.1 The Scheme by Cimato, De Santis, Ferrara, and Masucci
9.4.2.2 The Scheme by Hu and Tzeng
9.4.2.3 The Scheme by Yang, Wang, and Chen
9.4.3 A Construction Using a Nonperfect Black VCS
10 Cheating Prevention in Visual Cryptography
Yu-Chi Chen, Gwoboa Horng, and Du-Shiau Tsai
10.3 Cheating Prevention Schemes
10.4 Analysis of Cheating Prevention Schemes
11 Resolving the Alignment Problem in Visual Cryptography
Feng Liu
11.3 Misalignment with Integer Number of Subpixels
11.4 Misalignment with Less Than One Subpixel
11.4.1 Shares with Slightly Misalignment Can Still Recover the Secret Image
11.4.2 Large Subpixels Have Better Misalignment Tolerance
11.5 A Misalignment Tolerant VCS
11.6 Conclusions and Discussions
12 Applications of Visual Cryptography
Bernd Borchert and Klaus Reinhardt
12.2 Trojan-Secure Confirmation of Transactions
12.3 Trojan-Secure Authentication Using a PIN
12.4 Security versus Multiple Use
12.6 Technical Problems Concerning Adjustment and Parallaxes
12.7 Voting with a Receipt Based on visual cryptography
13 Steganography in Halftone Images
Oscar C. Au, Yuanfang Guo, and John S. Ho
13.2 A Review of Error Diffusion
13.3 Data Hiding by Stochastic Error Diffusion (DHSED)
13.4 Data Hiding by Conjugate Error Diffusion (DHCED) 359
14 Image Secret Sharing
WeiQi Yan, Jonathan Weir, and Mohan S. Kankanhalli
14.3 Approaches for Image Sharing
14.3.1 Shamir’s Secret Sharing Scheme
14.3.2 Color Image Sharing Based on the Lagrange Interpolation
14.3.3 Color Image Sharing Based on Moving Lines
14.4 Experiment and Evaluation
15 Polynomial-Based Image Sharing
Shiuh-Jeng Wang, Chen-Hsing Yang, and Yu-Ting Chen
15.2 Polynomial-Based Sharing Scheme
15.2.1 Shamir’s Secret Sharing Scheme
15.2.2 Lagrange Interpolation Scheme
15.3 Preliminaries and Related Works
15.3.4 Inverted Pattern LSB Scheme
15.3.5 Scalable Secret Image Sharing
15.5.2 Evaluating Authentication
16 Image Sharing with Steganography and Authentication
Zhao-Xia Yin, Chia-Chen Lin, and Chin-Chen Chang
16.3 Adopted Techniques in the Proposed Scheme
16.3.1 Error Diffusion Technique
16.3.2 Interpolation Technique
16.3.4 Edge Lookup Inverse Halftoning Technique
16.3.5 Shamir Scheme for Secret Sharing
16.4.1 Sharing and Embedding Phase
16.4.2 Reconstruction and Verifying Phase
17 Two-Decoding-Option Image Sharing Method
Ching-Nung Yang, Chuei-Bang Ciou, and Tse-Shih Chen
3.129.70.157