Emerging Trends in Visual Secret Sharing

  • Authors

    • Mainejar Yadav
    • Ranvijay .
    2018-07-20
    https://doi.org/10.14419/ijet.v7i3.12.16110
  • Cheating, Essential participants, General access structure, Meaningful share, Pixel expansion, Progressive VSS, Random grids, Visual secret sharing.
  • Visual Secret Sharing (VSS) is an increased applicability of traditional secret sharing. In VSS, the secret information is recovered by human visual system or lightweight computational device. There are two models available in VSS, one is Visual Cryptography (VC) which is introduced by Naor's in 1994 and other is a Random Grid (RG) based VSS which is proposed by Keren and Kafri. This state of the art covers both the models of VSS along with its application. The various application areas of VSS are visual authentication and identification, image encryption, access control, data hiding etc. The chapter has also covered various future enhancements in VC based on cryptanalysis, optimal pixel expansion, multiple secret encoding, progressive VC etc. Random Grid based VSS have some advantages over VC, which eliminates the need of Pixel expansion and codebook. But still, there is scope for the improvements in the contrast and the complexity of exiting algorithms. So there are various challenges and opportunities which make it an exciting research area to work upon.

     

  • References

    1. [1] M. Naor and A. Shamir,â€Visual Cryptographyâ€, Eurocrypt’, vol. 950, Springer,1994.

      [2] Wei-Qi Yan, D. Jin, Kankanhalli, M.S., “Visual cryptography for Print and Scan applicationsâ€, Proceedings of the International Symposium on Circuits and Systems,2004.

      [3] K. Kim, J. Park and Y. Zheng , “Human-machine Identification using visual cryptographyâ€, In Proceedings of the 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems, pp. 178–182, 1998.

      [4] T.Katoh and H.Imai , “An Application of Visual Secret Sharing Scheme Concealing Plural Secret Images to Human Identification Schemeâ€, Proc. of SITA’96, pp. 661-664, 1996.

      [5] S.Droste , “New Results on Visual Cryptographyâ€, Advanced in Cryptology-CRYPT’96, pp. 401-415, 1996.

      [6] M. Agnihotra Sharma and M. Chinna Rao , “Visual Cryptography Authentication for Data Matrix Codeâ€, International Journal of Computer Science and Telecommunications, pp. 58-62, 2011.

      [7] Wen-Pinn Fang , “Offline QR Code Authorization Based on Visual Cryptographyâ€, Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 89-92, 2011.

      [8] A.Vinodhini and L. J. Ambarasi , “Visual Cryptography for Authentication Using CAPTCHAâ€, International Journal of Computer and Internet Security, pp. 67-76, 2010.

      [9] Y.V. Subba Rao, Y. Sukonkina, B. Chakravarty and U. K. Singh, “Fingerprint Based Authentication Application using Visual Cryptography Methodsâ€, TENCONIEEE, pp. 1-5, 2008.

      [10] Hegde, Manu S, P D. Shenoy, Venugopal K R, L M Patnaik, “Secure Authentication using Image Processing and Visual Cryptography for Banking Applicationsâ€, ADCOM, pp. 65-72, 2008.

      [11] R. Sindhuja, R. D. Sathiya and V. Vaiythiyanathan, “Sheltered Iris Attestation by means of Visual Cryptography (SIA-VC)â€, ICAESM -2012, pp. 650-655, 2012.

      [12] S. Suryadevara, R. Naaz, Shweta, S. Kapoor, A. Sharma, “Visual Cryptography Improvises the Security of Tongue as a Biometric in Banking Systemâ€, ICCCT, pp. 412-415, 2011.

      [13] Tunga and S. Mukherjee, “Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Schemeâ€, IJCSI, pp. 182-186, 2012.

      [14] Yi, S. Y., Chung, K. L., Ryu, C. S., Cha, K. H., Lee, S. H., and Kim, E. S.,. “Encryption of Cell-oriented Computer Generated Hologram by using visual cryptographyâ€, CLEO/Pacific Rim, Vol. 3, pp. 817-818, 1999.

      [15] O. Kafri, E. Keren , “Encryption of pictures and shapes by random gridsâ€, Opt. Lett. 12, pp. 377–379, 1987.

      [16] H.-C. Chao, T.-Y. Fan, “XOR-based progressive visual secret sharing using generalized random gridsâ€, Displays 49, pp. 6-15, 2017.

      [17] X. Yan, S. Wang ,X. Niu , C.-N. Yang, “Random grid-based visual secret sharing with multiple decryptionsâ€, J.Vis. Commun. Image. R.26, pp. 94-104, 2015.

      [18] T.H. Chen, K.H. Tsao, “Visual secret sharing by random grids revisitedâ€, Pattern Recogn. 42, pp. 2203–2217, 2009.

      [19] T.H. Chen, K.H. Tsao,“Threshold visual secret sharing by random gridsâ€, J. Syst. Softw. 84, pp. 1197–1208, 2011.

      [20] X. Wu, W. Sun, “generalized random grid and its applications in visual cryptographyâ€, IEEE Trans. Inf. Forensics Security 8, pp. 1541–1553, 2013.

      [21] Jin, W.Q. Yan, M.S. Kankanhalli, “Progressive color visual cryptographyâ€, J. Electron. Imaging 14 (3), 2005.

      [22] S.K. Chen, “Friendly progressive visual secret sharing using generalized random gridsâ€, Opt. Eng. 48, 2009.

      [23] W.P. Fang, J.C. Lin, “Progressive viewing and sharing of sensitive imagesâ€, Pattern Recognition Image Anal. 16, pp. 638–642, 2006.

      [24] Y.C. Hou, Z.Y. Quan, “Progressive visual cryptography with unexpanded sharesâ€,IEEE Trans. Circ. Sys. Video Tech. 21, pp. 1760–1764, 2011.

      [25] Gonzalo R. Arce, “Halftone Visual Cryptography via error diffusionâ€, IEEE Trans. Inf. Forensics Security, vol. 4, 2009.

      [26] Chang, C. Tsai, and T. Chen, “A New Scheme for Sharing Secret Color Images in Computer Networkâ€, Proc. of International Conference on Parallel and Distributed Systems, pp. 21-27, 2000.

      [27] Chin-Chen Chang and Tai-Xing Yu., “Sharing a secret gray image in multiple imagesâ€, International Symposium on Cyber Worlds, 2002.

      [28] Y. Yamaguchi, “Extended Visual Cryptography scheme for multiple-secrets continuous-tone imagesâ€, Trans. on DHMS IX, Springer, pp. 25-41, 2014.

      [29] T. H. Chen, and C. S. Wu., “Efficient multi-secret image sharing based on Boolean operationsâ€, Journal of Signal Proc., pp. 90-97, 2011.

      [30] Wu, C. and C. , “A study on visual cryptography, Masters thesisâ€, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C, 1998.

      [31] Hsu, H.C., Chen, T.S., Lin and Y.H., “The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharingâ€, Networking, Sensing and Control 2, 2004.

      [32] Tsai, C.S., Chang, Y.F., Feng, J.B., Wu, H.C., Chu, and Y.P. , “Visual secret sharing for multiple secretsâ€, Pattern Recognition, 2008

      [33] J.-S. Lee, C.-C. Chang, N.Tu Huynh and H.-Yi Tsai, “Preserving user-friendly and high-contrast quality for multiple secret sharing techniquesâ€, Digital Signal Proc., pp. 131-139, 2015.

      [34] Her Chang Chao and T. Y. Fan, “Generating random grid-based visual secret sharing with multi-level encodingâ€, Signal Processing: Image Communication 57, pp. 60-67, 2017.

      [35] Li, P., Yang, C.N., Wu, C.C., Kong, Q., Ma, Y., “Essential secret image sharing scheme with different importance of shadowsâ€, Journal of Visual Communication and Image Representation, pp. 1106-1114, 2013.

      [36] C.N. Yang, P. Li, C.C. Wu, S.R. Cai, “Reducing shadow size in essential secret image sharing by conjunctive hierarchical approachâ€, Signal Process. Image Communication 31, pp. 1-9, 2015.

  • Downloads

  • How to Cite

    Yadav, M., & ., R. (2018). Emerging Trends in Visual Secret Sharing. International Journal of Engineering & Technology, 7(3.12), 374-379. https://doi.org/10.14419/ijet.v7i3.12.16110