Skip to main content
Top

2019 | OriginalPaper | Chapter

A Weighted Threshold Visual Cryptography

Authors : Tai-Yuan Tu, Tzung-Her Chen, Ji-min Yang, Chih-Hung Wang

Published in: New Trends in Computer Technologies and Applications

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Over the past years, a visual secret sharing scheme gave each share the same ability to reconstruct the secret image. That means each participant had the same significance to reveal the secret. However, it is not realistic in real world for some applications. In this paper, the weighted \( (k,n) \)-threshold visual cryptography scheme is proposed, in which the secret image is encoded into some shares with different weights and the sum of weights for all shares has to be equal to \( n \), according to the share-holders of different priority levels. In the decoding phase, when the shares with different weights are superimposed and the sum of weights of all stacking shares is equal to or larger than \( k \), the secret is then visually recognizable. Otherwise, no information about secret image is revealed. The proposed scheme is the first weighted \( (k,n) \)-threshold visual cryptography method with no pixel expansion. It is suitable for applications in the real life.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Blakley, G.: Safeguarding cryptographic keys. In: Proceedings AFIPS 1979 National Computer Conference, pp. 313–317, AFIPS Press, New York (1979) Blakley, G.: Safeguarding cryptographic keys. In: Proceedings AFIPS 1979 National Computer Conference, pp. 313–317, AFIPS Press, New York (1979)
3.
go back to reference Chao, K.Y., Lin, J.C.: User-friendly sharing of images: progressive approach based on modulus operation. J. Electronic Imaging 18(3), 0330081–0330089 (2009)CrossRef Chao, K.Y., Lin, J.C.: User-friendly sharing of images: progressive approach based on modulus operation. J. Electronic Imaging 18(3), 0330081–0330089 (2009)CrossRef
4.
go back to reference Chen, S.K.: Weighted visual cryptography with non-expansible shares. J. Image Process. Commun. 5(1), 1–6 (2013) Chen, S.K.: Weighted visual cryptography with non-expansible shares. J. Image Process. Commun. 5(1), 1–6 (2013)
5.
go back to reference Chen, T.H., Lee, Y.S.: Yet another friendly progressive visual secret sharing scheme. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2009) Chen, T.H., Lee, Y.S.: Yet another friendly progressive visual secret sharing scheme. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2009)
6.
go back to reference Cimato, S., Prisco, R.D., Santis, A.D.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2006)MATHCrossRef Cimato, S., Prisco, R.D., Santis, A.D.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2006)MATHCrossRef
7.
go back to reference Fang, W.P.: Friendly progressive visual secret sharing. Pattern Recogn. 41, 1410–1414 (2008)MATHCrossRef Fang, W.P.: Friendly progressive visual secret sharing. Pattern Recogn. 41, 1410–1414 (2008)MATHCrossRef
9.
go back to reference Homiest, T., Krause, M., Simon, H.U.: Contrast optimal k out of n secret sharing schemes in visual cryptography. Theoret. Comput. Sci. 240, 471–485 (2000)MathSciNetMATHCrossRef Homiest, T., Krause, M., Simon, H.U.: Contrast optimal k out of n secret sharing schemes in visual cryptography. Theoret. Comput. Sci. 240, 471–485 (2000)MathSciNetMATHCrossRef
10.
go back to reference Hou, Y.C.: Visual cryptography for color images. Pattern Recogn. 36(7), 1619–1629 (2003)CrossRef Hou, Y.C.: Visual cryptography for color images. Pattern Recogn. 36(7), 1619–1629 (2003)CrossRef
11.
go back to reference Hou, Y.C., Chang, C.Y., Hsu, C.S.: Visual cryptography for color images without pixel expansion. In: Proceeding of CISST 2001, vol. I, pp. 239–245, Las Vegas (2001) Hou, Y.C., Chang, C.Y., Hsu, C.S.: Visual cryptography for color images without pixel expansion. In: Proceeding of CISST 2001, vol. I, pp. 239–245, Las Vegas (2001)
12.
go back to reference Hou, Y.C., Quan, Z.Y., Tsai, C.F.: General model for the priority-based progressive visual secret sharing. Journal of C.C.I.T, 42(2), 33–48 (2013) Hou, Y.C., Quan, Z.Y., Tsai, C.F.: General model for the priority-based progressive visual secret sharing. Journal of C.C.I.T, 42(2), 33–48 (2013)
15.
go back to reference Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26(5), 765–770 (2002)CrossRef Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26(5), 765–770 (2002)CrossRef
18.
go back to reference Wang, A., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on boolean operations. Pattern Recogn. 40, 2776–2785 (2007)MATHCrossRef Wang, A., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on boolean operations. Pattern Recogn. 40, 2776–2785 (2007)MATHCrossRef
19.
go back to reference Yang, N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25(4), 481–494 (2004)CrossRef Yang, N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25(4), 481–494 (2004)CrossRef
20.
go back to reference Yang, C.N., Chen, T.S.: Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recogn. Lett. 26, 193–206 (2005)MathSciNetCrossRef Yang, C.N., Chen, T.S.: Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recogn. Lett. 26, 193–206 (2005)MathSciNetCrossRef
Metadata
Title
A Weighted Threshold Visual Cryptography
Authors
Tai-Yuan Tu
Tzung-Her Chen
Ji-min Yang
Chih-Hung Wang
Copyright Year
2019
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-9190-3_64

Premium Partner