DocumentCode
3238992
Title
Enhancing image quality in Visual Cryptography with colors
Author
Chun-Yuan Hsiao ; Hao-Ji Wang
Author_Institution
Dept. of Comput. Sci. & Inf. Eng., Nat. Kaohsiung Univ. of Appl. Sci., Kaohsiung, Taiwan
fYear
2012
fDate
14-16 Aug. 2012
Firstpage
103
Lastpage
106
Abstract
The notion of Visual Cryptography was first introduced by Naor and Shamir in 1994 [NS94]. Here “visual” means that the decryption is done by human eyes instead of by any computing devices. To retrieve the ciphertext, simply stack the encrypted images together. In fact, it is more like an image secret sharing scheme than an encryption scheme. Both the secret and the shares are black-and-white pictures, and the shares are drawn on transparent slides to be later stacked together. The shares of the original Naor and Shamir scheme [NS94] are random black-and-white pixels-meaningless images. Chiu [C02] proposed a scheme where shares can be any (meaningful) pictures. Unfortunately, its reconstructed image (stacked share images) is not as clear. To improve the reconstructed image quality, we adopt the color model proposed by De Prisco and De Santis [DD11]. Our input secret image is still black-and-white, but we inject color pixels into the share images. The reconstructed image contains color pixels but looks much more alike to the input black-and-white secret image. The technical difficulty of this work is how and where to inject the color pixels so that both the share and the reconstructed images have high quality.
Keywords
cryptography; image colour analysis; image enhancement; image reconstruction; image retrieval; black-and-white secret image; ciphertext retrieval; colors; computing devices; decryption; human eyes; image encryption scheme; image quality enhancement; image quality reconstruction; image secret sharing scheme; meaningless images; random black-and-white pixels; stacked share images; visual cryptography; Computer science; Cryptography; Humans; Image color analysis; Image quality; Image reconstruction; Visualization; secret-sharing scheme; visual cryptography;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Security and Intelligence Control (ISIC), 2012 International Conference on
Conference_Location
Yunlin
Print_ISBN
978-1-4673-2587-5
Type
conf
DOI
10.1109/ISIC.2012.6449718
Filename
6449718
Link To Document