Emerging Trends in Visual Secret Sharing
Keywords:Cheating, Essential participants, General access structure, Meaningful share, Pixel expansion, Progressive VSS, Random grids, Visual secret sharing.
Visual Secret Sharing (VSS) is an increased applicability of traditional secret sharing. In VSS, the secret information is recovered by human visual system or lightweight computational device. There are two models available in VSS, one is Visual Cryptography (VC) which is introduced by Naor's in 1994 and other is a Random Grid (RG) based VSS which is proposed by Keren and Kafri. This state of the art covers both the models of VSS along with its application. The various application areas of VSS are visual authentication and identification, image encryption, access control, data hiding etc. The chapter has also covered various future enhancements in VC based on cryptanalysis, optimal pixel expansion, multiple secret encoding, progressive VC etc. Random Grid based VSS have some advantages over VC, which eliminates the need of Pixel expansion and codebook. But still, there is scope for the improvements in the contrast and the complexity of exiting algorithms. So there are various challenges and opportunities which make it an exciting research area to work upon.
 M. Naor and A. Shamir,â€Visual Cryptographyâ€, Eurocryptâ€™, vol. 950, Springer,1994.
 Wei-Qi Yan, D. Jin, Kankanhalli, M.S., â€œVisual cryptography for Print and Scan applicationsâ€, Proceedings of the International Symposium on Circuits and Systems,2004.
 K. Kim, J. Park and Y. Zheng , â€œHuman-machine Identification using visual cryptographyâ€, In Proceedings of the 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems, pp. 178â€“182, 1998.
 T.Katoh and H.Imai , â€œAn Application of Visual Secret Sharing Scheme Concealing Plural Secret Images to Human Identification Schemeâ€, Proc. of SITAâ€™96, pp. 661-664, 1996.
 S.Droste , â€œNew Results on Visual Cryptographyâ€, Advanced in Cryptology-CRYPTâ€™96, pp. 401-415, 1996.
 M. Agnihotra Sharma and M. Chinna Rao , â€œVisual Cryptography Authentication for Data Matrix Codeâ€, International Journal of Computer Science and Telecommunications, pp. 58-62, 2011.
 Wen-Pinn Fang , â€œOffline QR Code Authorization Based on Visual Cryptographyâ€, Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 89-92, 2011.
 A.Vinodhini and L. J. Ambarasi , â€œVisual Cryptography for Authentication Using CAPTCHAâ€, International Journal of Computer and Internet Security, pp. 67-76, 2010.
 Y.V. Subba Rao, Y. Sukonkina, B. Chakravarty and U. K. Singh, â€œFingerprint Based Authentication Application using Visual Cryptography Methodsâ€, TENCONIEEE, pp. 1-5, 2008.
 Hegde, Manu S, P D. Shenoy, Venugopal K R, L M Patnaik, â€œSecure Authentication using Image Processing and Visual Cryptography for Banking Applicationsâ€, ADCOM, pp. 65-72, 2008.
 R. Sindhuja, R. D. Sathiya and V. Vaiythiyanathan, â€œSheltered Iris Attestation by means of Visual Cryptography (SIA-VC)â€, ICAESM -2012, pp. 650-655, 2012.
 S. Suryadevara, R. Naaz, Shweta, S. Kapoor, A. Sharma, â€œVisual Cryptography Improvises the Security of Tongue as a Biometric in Banking Systemâ€, ICCCT, pp. 412-415, 2011.
 Tunga and S. Mukherjee, â€œDesign and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Schemeâ€, IJCSI, pp. 182-186, 2012.
 Yi, S. Y., Chung, K. L., Ryu, C. S., Cha, K. H., Lee, S. H., and Kim, E. S.,. â€œEncryption of Cell-oriented Computer Generated Hologram by using visual cryptographyâ€, CLEO/Pacific Rim, Vol. 3, pp. 817-818, 1999.
 O. Kafri, E. Keren , â€œEncryption of pictures and shapes by random gridsâ€, Opt. Lett. 12, pp. 377â€“379, 1987.
 H.-C. Chao, T.-Y. Fan, â€œXOR-based progressive visual secret sharing using generalized random gridsâ€, Displays 49, pp. 6-15, 2017.
 X. Yan, S. Wang ,X. Niu , C.-N. Yang, â€œRandom grid-based visual secret sharing with multiple decryptionsâ€, J.Vis. Commun. Image. R.26, pp. 94-104, 2015.
 T.H. Chen, K.H. Tsao, â€œVisual secret sharing by random grids revisitedâ€, Pattern Recogn. 42, pp. 2203â€“2217, 2009.
 T.H. Chen, K.H. Tsao,â€œThreshold visual secret sharing by random gridsâ€, J. Syst. Softw. 84, pp. 1197â€“1208, 2011.
 X. Wu, W. Sun, â€œgeneralized random grid and its applications in visual cryptographyâ€, IEEE Trans. Inf. Forensics Security 8, pp. 1541â€“1553, 2013.
 Jin, W.Q. Yan, M.S. Kankanhalli, â€œProgressive color visual cryptographyâ€, J. Electron. Imaging 14 (3), 2005.
 S.K. Chen, â€œFriendly progressive visual secret sharing using generalized random gridsâ€, Opt. Eng. 48, 2009.
 W.P. Fang, J.C. Lin, â€œProgressive viewing and sharing of sensitive imagesâ€, Pattern Recognition Image Anal. 16, pp. 638â€“642, 2006.
 Y.C. Hou, Z.Y. Quan, â€œProgressive visual cryptography with unexpanded sharesâ€,IEEE Trans. Circ. Sys. Video Tech. 21, pp. 1760â€“1764, 2011.
 Gonzalo R. Arce, â€œHalftone Visual Cryptography via error diffusionâ€, IEEE Trans. Inf. Forensics Security, vol. 4, 2009.
 Chang, C. Tsai, and T. Chen, â€œA New Scheme for Sharing Secret Color Images in Computer Networkâ€, Proc. of International Conference on Parallel and Distributed Systems, pp. 21-27, 2000.
 Chin-Chen Chang and Tai-Xing Yu., â€œSharing a secret gray image in multiple imagesâ€, International Symposium on Cyber Worlds, 2002.
 Y. Yamaguchi, â€œExtended Visual Cryptography scheme for multiple-secrets continuous-tone imagesâ€, Trans. on DHMS IX, Springer, pp. 25-41, 2014.
 T. H. Chen, and C. S. Wu., â€œEfficient multi-secret image sharing based on Boolean operationsâ€, Journal of Signal Proc., pp. 90-97, 2011.
 Wu, C. and C. , â€œA study on visual cryptography, Masters thesisâ€, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C, 1998.
 Hsu, H.C., Chen, T.S., Lin and Y.H., â€œThe ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharingâ€, Networking, Sensing and Control 2, 2004.
 Tsai, C.S., Chang, Y.F., Feng, J.B., Wu, H.C., Chu, and Y.P. , â€œVisual secret sharing for multiple secretsâ€, Pattern Recognition, 2008
 J.-S. Lee, C.-C. Chang, N.Tu Huynh and H.-Yi Tsai, â€œPreserving user-friendly and high-contrast quality for multiple secret sharing techniquesâ€, Digital Signal Proc., pp. 131-139, 2015.
 Her Chang Chao and T. Y. Fan, â€œGenerating random grid-based visual secret sharing with multi-level encodingâ€, Signal Processing: Image Communication 57, pp. 60-67, 2017.
 Li, P., Yang, C.N., Wu, C.C., Kong, Q., Ma, Y., â€œEssential secret image sharing scheme with different importance of shadowsâ€, Journal of Visual Communication and Image Representation, pp. 1106-1114, 2013.
 C.N. Yang, P. Li, C.C. Wu, S.R. Cai, â€œReducing shadow size in essential secret image sharing by conjunctive hierarchical approachâ€, Signal Process. Image Communication 31, pp. 1-9, 2015.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).