Abstract
The visual quality of the recovered secret image is usually evaluated by contrast in visual cryptography (VC). Precisely, the reconstructed secret image can be recognized as the original secret image when contrast is greater than zero. It is important for the user to know the clarity of the revealed secret image corresponding to different contrast values. In this paper, the clarity corresponding to contrast is investigated through conducting subjective evaluation scores and objective evaluation indexes, which can be extended to general applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25(4), 481–494 (2004)
Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemese based on boolean operations. Pattern Recogn. 40(10), 2776–2785 (2007)
Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383–396 (2009)
Weir, J., Yan, W.Q.: A comprehensive study of visual cryptography. In: Shi, Y.Q. (ed.) Transactions on DHMS V. LNCS, vol. 6010, pp. 70–105. Springer, Heidelberg (2010)
Lee, S., Yoo, C.D., Kalker, T.: Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. Forensics Secur. 2(3), 321–330 (2007)
Blundo, C., De Bonis, A., De Santis, A.: Improved schemes for visual cryptography. Des. Codes Crypt. 24(3), 255–278 (2001)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)
Liu, F., Wu, C.K., Lin, X.J.: Colour visual cryptography schemes. IET Inf. Secur. 2(4), 151–165 (2008)
Hou, Y.C.: Visual cryptography for color images. Pattern Recogn. 36(7), 1619–1629 (2003)
Luo, H., Yu, F., Pan, J.S., Lu, Z.M.: Robust and progressive color image visual secret sharing cooperated with data hiding. In: Eighth International Conference on Intelligent Systems Design and Applications, 2008, ISDA 2008, vol. 3, pp. 431–436. IEEE (2008)
Prakash, N.K., Govindaraju, S.: Visual secret sharing schemes for color images using halftoning. In: International Conference on Conference on Computational Intelligence and Multimedia Applications, 2007, vol. 3, pp. 174–178. IEEE (2007)
Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recogn. 40(12), 3633–3651 (2007)
Eisen, P.A., Stinson, D.R.: Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. Des. Codes Crypt. 25(1), 15–61 (2002)
Liu, F., Wu, C., Lin, X.: Step construction of visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 5(1), 27–38 (2010)
Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 82(10), 2172–2177 (1999)
Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2006)
Shyu, S.J.: Image encryption by random grids. Pattern Recogn. 40(3), 1014–1031 (2007)
Guo, T., Liu, F., Wu, C.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86(8), 2094–2109 (2013)
Wu, X., Sun, W.: Generalized random grid and its applications in visual cryptography. IEEE Trans. Inf. Forensics Secur. 8(9), 1541–1553 (2013)
Liu, F., Wu, C., Qian, L., et al.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331–342 (2012)
Acknowledgement
The authors wish to thank the volunteers for their help. The authors wish to thank Dr. Xianhua Song and Dr. Jianzhi Sang for their suggestions to improve this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Yan, X., Lu, Y., Huang, H., Liu, L., Wan, S. (2016). Clarity Corresponding to Contrast in Visual Cryptography. In: Che, W., et al. Social Computing. ICYCSEE 2016. Communications in Computer and Information Science, vol 623. Springer, Singapore. https://doi.org/10.1007/978-981-10-2053-7_23
Download citation
DOI: https://doi.org/10.1007/978-981-10-2053-7_23
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2052-0
Online ISBN: 978-981-10-2053-7
eBook Packages: Computer ScienceComputer Science (R0)