Skip to main content
Log in

Size-invariant extended visual cryptography with embedded watermark based on error diffusion

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A (2, 2) extended visual cryptography scheme with meaningful shares and no pixel expansion is constructed in this paper. In addition to the secret image, an additional watermark is also embedded to serve for authentication purpose. This watermark can be recovered by stacking a shifted version of one share with the other share. More importantly, the recovered watermark and secret images are free from interferences from the cover images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Chang CC, Chen YH, Chuang LY (2014) Meaningful shadows for image secret sharing with steganography and authentication techniques. J Inf Hiding Multimed Signal Process 5(3):342–352

    Google Scholar 

  2. Chen TH, Tsao KH (2011) User-friendly random-grid-based visual secret sharing. IEEE Trans Circ Syst Video Technol 21:1693–1703

    Article  Google Scholar 

  3. Cimato S, Yang SN (2012) Visual Cryptography and Secret Image Sharing. CRC Press

  4. Fang WP, Lin JC (2006) Visual cryptography with extra ability of hiding confidential data. J Electron Imaging 15(2):1–7

    Article  Google Scholar 

  5. Fu MS, Au OC (2003) Steganography in halftone images: conjugate error diffusion. Signal Process 83(10):2171–2178

    Article  MATH  Google Scholar 

  6. Guo C, Wang ZH, Chang CC, Qin C (2011) A secret image sharing scheme with high quality shadows based on exploiting modification direction. J Multimed 6 (4):341–348

    Article  Google Scholar 

  7. Hou YC (2003) Visual cryptography for color images. Pattern Recogn 36:1619–1629

    Article  Google Scholar 

  8. Huang HC, Chang FC, Fang WC (2011) Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans. Consum Electron 57(2):779–787

    Article  Google Scholar 

  9. Huang HC, Fang WC (2011) Authenticity preservation with histogram-based reversible data hiding and quadtree concepts. Sensors 11(10):9717–9731

    Article  Google Scholar 

  10. Huang YJ, Chang JD (2013) Non-expanded visual cryptography scheme with authentication. In: IEEE 2nd International Symposium on Next-Generation Electronics (ISNE). IEEE, IEEE, Taiwan, pp 165– 168

  11. Ito R, Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE Trans Fundam E82-A(10):2172–2177

  12. Liu F, Wu CK (2011) Embedded extended visual cryptography schemes. IEEE Trans Inf Forensic Secur 6(2):307–322

    Article  Google Scholar 

  13. Liu F, Yan WQ (2014) Visual Cryptography for Image Processing and Security. Springer

  14. Lou DC, Chen HH, Wu HC, Tsai CS (2011) A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares. Displays 32:118–134

    Article  Google Scholar 

  15. Luo H, Yu F (2008) Data hiding in image size invariant visual cryptography. In: Innovative Computing Information and Control, 2008. ICICIC ’08. 3rd International Conference on , pp 25–25

  16. Naor M, Shamir A (1994) Visual cryptography. In: EUROCRYPT’94, pp 1–12

  17. Pang WM, Qu Y, Wong TT, Cohen-Or D, Heng PA (2008) Structure-aware halftoning. ACM Transactions on Graphics (SIGGRAPH 2008 issue) 27(3):89:1–89:8

  18. Thajeel SAN, Sulong G (2015) A novel approach for detection of copy move forgery using completed robust local binary pattern. J Inf Hiding Multimed Signal Process 6 (2):351– 364

    Google Scholar 

  19. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612

  20. Wang ZM, Arce GR, Crescenzo GD (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensic Secur 4(3):383–396

    Article  Google Scholar 

  21. Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recogn Lett 25:481–494

    Article  Google Scholar 

  22. Yang CY, Wang WF, Wang YF, Wang RZ (2015) A simple watermarking scheme with high perceptual quality for still color images based on RWM and centroid. J Inf Hiding Multimed Signal Process 6(3):577–590

    Google Scholar 

  23. Zhou Z, Arce GR, Crescenzo GD (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by Natural Science Foundation of China (No. 61272432), Qingdao science and technology development plan (No. 12-1-4-6-(10)-jch), Shandong Provincial Natural Science Foundation (No. ZR2014JL044). The work of Ya-Fei Wang is also supported by Graduate Innovation Fund of Shandong University of Science and Technology (No. YC140340).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bin Yan.

Appendix

Appendix

In this appendix, we list the pseudo-code describing the reference algorithms used in our experiments. Chen’s random grid based algorithm is shown in Algorithm 1 [2], while Lou’s pixel swapping based visual cryptography algorithm is summarized in Algorithm 2 [14]. Chen’s algorithm encodes only the secret image into the share images, no watermark is embedded, while Lou’s algorithm also embed a watermark into the share images. The embedding process is similar to ours, so we omit it in the pseudo-code.

figure e
figure f

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yan, B., Wang, YF., Song, LY. et al. Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimed Tools Appl 75, 11157–11180 (2016). https://doi.org/10.1007/s11042-015-2838-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2838-4

Keywords

Navigation