Abstract
A (2, 2) extended visual cryptography scheme with meaningful shares and no pixel expansion is constructed in this paper. In addition to the secret image, an additional watermark is also embedded to serve for authentication purpose. This watermark can be recovered by stacking a shifted version of one share with the other share. More importantly, the recovered watermark and secret images are free from interferences from the cover images.
Similar content being viewed by others
References
Chang CC, Chen YH, Chuang LY (2014) Meaningful shadows for image secret sharing with steganography and authentication techniques. J Inf Hiding Multimed Signal Process 5(3):342–352
Chen TH, Tsao KH (2011) User-friendly random-grid-based visual secret sharing. IEEE Trans Circ Syst Video Technol 21:1693–1703
Cimato S, Yang SN (2012) Visual Cryptography and Secret Image Sharing. CRC Press
Fang WP, Lin JC (2006) Visual cryptography with extra ability of hiding confidential data. J Electron Imaging 15(2):1–7
Fu MS, Au OC (2003) Steganography in halftone images: conjugate error diffusion. Signal Process 83(10):2171–2178
Guo C, Wang ZH, Chang CC, Qin C (2011) A secret image sharing scheme with high quality shadows based on exploiting modification direction. J Multimed 6 (4):341–348
Hou YC (2003) Visual cryptography for color images. Pattern Recogn 36:1619–1629
Huang HC, Chang FC, Fang WC (2011) Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans. Consum Electron 57(2):779–787
Huang HC, Fang WC (2011) Authenticity preservation with histogram-based reversible data hiding and quadtree concepts. Sensors 11(10):9717–9731
Huang YJ, Chang JD (2013) Non-expanded visual cryptography scheme with authentication. In: IEEE 2nd International Symposium on Next-Generation Electronics (ISNE). IEEE, IEEE, Taiwan, pp 165– 168
Ito R, Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE Trans Fundam E82-A(10):2172–2177
Liu F, Wu CK (2011) Embedded extended visual cryptography schemes. IEEE Trans Inf Forensic Secur 6(2):307–322
Liu F, Yan WQ (2014) Visual Cryptography for Image Processing and Security. Springer
Lou DC, Chen HH, Wu HC, Tsai CS (2011) A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares. Displays 32:118–134
Luo H, Yu F (2008) Data hiding in image size invariant visual cryptography. In: Innovative Computing Information and Control, 2008. ICICIC ’08. 3rd International Conference on , pp 25–25
Naor M, Shamir A (1994) Visual cryptography. In: EUROCRYPT’94, pp 1–12
Pang WM, Qu Y, Wong TT, Cohen-Or D, Heng PA (2008) Structure-aware halftoning. ACM Transactions on Graphics (SIGGRAPH 2008 issue) 27(3):89:1–89:8
Thajeel SAN, Sulong G (2015) A novel approach for detection of copy move forgery using completed robust local binary pattern. J Inf Hiding Multimed Signal Process 6 (2):351– 364
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612
Wang ZM, Arce GR, Crescenzo GD (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensic Secur 4(3):383–396
Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recogn Lett 25:481–494
Yang CY, Wang WF, Wang YF, Wang RZ (2015) A simple watermarking scheme with high perceptual quality for still color images based on RWM and centroid. J Inf Hiding Multimed Signal Process 6(3):577–590
Zhou Z, Arce GR, Crescenzo GD (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453
Acknowledgments
This work is supported by Natural Science Foundation of China (No. 61272432), Qingdao science and technology development plan (No. 12-1-4-6-(10)-jch), Shandong Provincial Natural Science Foundation (No. ZR2014JL044). The work of Ya-Fei Wang is also supported by Graduate Innovation Fund of Shandong University of Science and Technology (No. YC140340).
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
In this appendix, we list the pseudo-code describing the reference algorithms used in our experiments. Chen’s random grid based algorithm is shown in Algorithm 1 [2], while Lou’s pixel swapping based visual cryptography algorithm is summarized in Algorithm 2 [14]. Chen’s algorithm encodes only the secret image into the share images, no watermark is embedded, while Lou’s algorithm also embed a watermark into the share images. The embedding process is similar to ours, so we omit it in the pseudo-code.
Rights and permissions
About this article
Cite this article
Yan, B., Wang, YF., Song, LY. et al. Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimed Tools Appl 75, 11157–11180 (2016). https://doi.org/10.1007/s11042-015-2838-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2838-4