Improving Quality of Multiple Secret Shares using GSNL Filter in Visual Cryptography
Abstract
In this paper, (Embedded Extended Visual
Cryptography Scheme (EEVCS) is utilized to hide multiple secret images into two or more meaningful cover images which are called share images with no pixel expansion. The manifold secret images are concatenated and embed in the respective number of cover images.
People who congregate the multiple share images can acquire either the separated secret images or the concatenated secret images by stacking them without any complex computation. The visual quality of the stacked share is improved using general sliding neighborhood filter
(GSNL FILTER) that exploits the functionalities of sliding window protocol, pixel padding, sorting and filtering. Visual quality factors
like PSNR (Peak Signal-to-Noise Ratio), UQI (Universal Quality
Index), EME (Enhancement Measure of Entropy), SSIM (Structural Similarity of Image Measure), and Mean SSIM are determined and compared with the existing values to appraise the enhanced factors.
Keywords
Full Text:
PDFReferences
A. Shamir. How to share a secret. In Communications of the ACM,
volume 22 (11), pages 612-613, 1979.
G. R. Blakley. Safeguarding cryptographic keys. In Proceedings of the
National Computer Conference, volume 48, pages 313-317, 1979.
M. Naor and A. Shamir. Visual cryptography. In EUROCRYPT '94,
Springer-Verlag Berlin, volume LNCS 950, pages 1-12, 1995.
M. Naor and B. Pinkas. Visual authentication and identification. In
CRYPTO '97, Springer-Verlag LNCS, volume 1294, pages 322-336,
C. Blundo, A. De Bonis, and A. De Santis. Improved schemes for visual
cryptography. In Designs, Codes and Cryptography, volume 24, pages
-278, 2001.
G. Ateniese, C. Blundo, A. De Santis, and D.R. Stinson. Visual
cryptography for general access structures. In Information and
Computation, volume 129, pages 86-106, 1996.
Y.C. Hou. Visual cryptography for color images. In Pattern Recognition,
volume 1773, pages 1-11, 2003.
S.J. Shyu, S.Y. Huang, Y.K. Lee, R.Z. Wang, and K. Chen. Sharing
multiple secrets in visual cryptography. In Pattern Recognition, volume
, Issue 12, pages 3633-3651, 2007.
P.A. Eisen and D.R. Stinson. Threshold visual cryptography schemes
with specified whiteness levels of reconstructed pixels. In Designs, Codes
and Cryptography, volume 25, pages 15-61,2002.
S. Droste. New results on visual cryptography. In CRYPTO '96,
Springer-Verlag Berlin LNCS, volume 1109, pages 401-415, 1996.
G.Ateniese, C. Blundo, A. De Santis, and D.R. Stinson. Extended
capabilities for visual cryptography. In ACM Theoretical Computer
Science, volume 250 Issue 1-2, pages 143-161, 2001.
D.S. Wang, F. Yi, and X.B. Li. On general construction for extended
visual cryptography schemes. In Pattern Recognition, volume 42, pages
-3082, 2009.
M. Nakajima and Y. Yamaguchi. Extended visual cryptography for
natural images. In WSCG Conference 2002, pages 303-412, 2002.
Z. Zhou, G.R. Arce, and G. Di Crescenzo. Halftone visual cryptography.
In IEEE Transactions on Image Processing, volume 15, NO.8, pages
-2453, 2006.
C.C. Lin and W.H. Tsai. Visual cryptography for gray-level images by
dithering techniques. In Pattern Recognition Letters, volume 24, Issue
-3, pages 349 - 358, 2003.
Zhou W. and A.C. Bovik. A universal image quality index. In IEEE
Signal Processing Letters, volume 9(3), pages 81-84, 2002.
Z.M. Wang, G.R. Arce, and G. Di Crescenzo. Halftone visual
cryptography via direct binary search. In EUSIPCO '06, 2006.
N. Krishna Prakash and S. Govindaraju. Visual secret sharing schemes for
color images using halftoning. In Proceedings of the International
Conference on Computational Intelligence and Multimedia Applications
(ICCIMA 2007), volume 3, pages 174-178, 2007.
H. Luo, F.X. Yu, J.S. Pan, and Z.M. Lu. Robust and progressive color
image visual secret sharing cooperated with data hiding. In Proceedings
of the 2008 Eighth International Conference on Intelligent Systems
Design and Applications, volume 3, pages 431-436, 2008.
H.C. Hsu, T.S. Chen, Y.H. Lin, The ring shadow image technology of
visual cryptography by applying diverse rotating angles to hide the secret
sharing, In: Proceedings of the 2004 IEEE International Conference on
Networking, Sensing & Control, Taipei, Taiwan, March 2004, pp.
–1001.
R.M. Davis, The data encryption standard in perspective, IEEE
Communications Magazine 16 (6) (1978) 5–9. [7] W. Diffie, The first ten
years of public-key cryptography, Innovations in Internetworking 76 (5)
(1988) 560–577.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.