[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Aspect ratio invariant visual cryptography by image filtering and resizing

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

In visual cryptographic scheme (VCS), each secret pixel is expanded to m subpixels in shadow images to encrypt a secret image. Apparently, we should put these m subpixels as a rectangle such that the blocks can be arranged compactly with each other. However, if the aspect ratio is viewed as important information of the secret image, the distortion occurs at the case that m is not a square. An aspect ratio invariant VCS (ARIVCS) was accordingly proposed to address the arrangement of subpixels. However, the existing ARIVCSs relied on adding dummy subpixels to the shadow images. In addition, their method needs a mapping pattern that reduces the number of dummy subpixels, but how to design a mapping pattern is a huge challenge. In this paper, we propose an easy solution to construct ARIVCS by image filtering and resizing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Xie B, Kumar A, Zhao D, Reddy R, Bing H (2010) On secure communication in integrated heterogeneous wireless networks. Int J Inf Technol Commun Convergence 1:4–23

    Article  Google Scholar 

  2. Wang SJ, Tsai YR, Shen CC, Chen PY (2010) Hierarchical key derivation scheme for group-oriented communication systems. Int J Inf Technol Commun Convergence 1:66–76

    Article  Google Scholar 

  3. Sarkar P, Saha A (2011) Security enhanced communication in wireless sensor networks using Reed-Muller codes and partially balanced incomplete block designs. J Convergence 2:23–30

    Google Scholar 

  4. Malakuti S, Aksit M, Bockisch C (2011) Runtime verification in distributed computing. J Convergence 2:1–10

    Google Scholar 

  5. Wang ZH, Chang CC, Tsai PY (2010) Hiding secret data in an image using codeword imitation. J Inf Process Syst 6:435–452

    Google Scholar 

  6. Panganiban A, Linsangan N, Caluyo F (2011) Wavelet-based feature extraction algorithm for an iris recognition system. J Inf Process Syst 7:425–434

    Google Scholar 

  7. Naor M, Shamir A (1995) Visual cryptography. LNCS 950:1–12

    MathSciNet  Google Scholar 

  8. Ito R, Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE Trans Fundam Elect Comm Comput Sci E82-A:2172–2177

    Google Scholar 

  9. Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recognit Lett 25:481–494

    Article  Google Scholar 

  10. Cimato S, De Prisco R, De Santis A (2006) Probabilistic visual cryptography schemes. Comput J 49:97–107

    Article  Google Scholar 

  11. Wang D, Yi F, Li X (2011) Probabilistic visual secret sharing schemes for grey-scale images and color images. Inf Sci 181:2189–2208

    Article  MathSciNet  MATH  Google Scholar 

  12. Shyu SJ, Huang SY, Lee YK, Wang RZ, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40:3633–3651

    Article  MATH  Google Scholar 

  13. Feng JB, Wu HC, Tsai CS, Chang YF, Chu YP (2008) Visual secret sharing for multiple secrets. Pattern Recogn 41:3572–3581

    Article  MATH  Google Scholar 

  14. Yang CN, Chung TH (2010) A general multi-secret visual cryptography scheme. Optics Commun 283:4949–4962

    Article  Google Scholar 

  15. Lee KH, Chiu PL (2011) A high contrast and capacity efficient visual cryptography scheme for the encryption of multiple secret images. Optics Commun 284:2730–2741

    Article  Google Scholar 

  16. Tsai DS, Chen TH, Horng G (2007) A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recogn 40:2356–2366

    Article  MATH  Google Scholar 

  17. Yang CN, Peng AG, Chen TS (2009) MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty. Signal Process 89:1602–1624

    Article  MATH  Google Scholar 

  18. Liu F, Wu CK, Lin XJ (2009) The alignment problem of visual cryptography schemes. Des Codes Crypt 50:215–227

    Article  MathSciNet  Google Scholar 

  19. Cimato S, De Santis A, Ferrara AL, Masucci B (2005) Ideal contrast visual cryptography schemes with reversing. Inf Process Lett 93:199–206

    Article  MATH  Google Scholar 

  20. Yang CN, Wang CC, Chen TS (2008) Visual cryptography schemes with reversing. Comput J 51:710–722

    Article  Google Scholar 

  21. Surekha B, Swamy G, Rao KS (2010) A multiple watermarking technique for images based on visual cryptography. Comput Appl 1:77–81

    Google Scholar 

  22. Monoth T, Anto PB (2010) Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput Sci 2:143–148

    Article  Google Scholar 

  23. Weir J, Yan W (2010) Resolution variant visual cryptography for street view of Google maps. In: Proceedings of ISCAS 2006, pp 1695–1698

  24. Yang CN, Chen TS, Ching MH (2006) Embed additional private information into two-dimensional barcodes by the visual secret sharing scheme. Integr Comput Aided Eng 13:189–199

    Google Scholar 

  25. Cimato S, Yang CN (2011) Visual cryptography and secret image sharing. CRC Press, Taylor & Francis, Boca Raton, FL, USA

    Google Scholar 

  26. Yang CN, Chen TS (2005) Aspect ratio invariant visual secret sharing with minimum pixel expansion. Pattern Recogn Lett 26:193–206

    Article  Google Scholar 

  27. Yang CN, Chen TS (2006) Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recogn 39:1300–1314

    Article  MATH  Google Scholar 

  28. Lin CC, Tsai WH (2003) Visual cryptography for gray-level images by dithering techniques. Pattern Recogn Lett 24:349–358

    Article  Google Scholar 

  29. Hou JC (2003) Visual cryptography for color images. Pattern Recogn 36:1619–1629

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported in part by Testbed@TWISC, National Science Council under the Grants NSC 100-2219-E-006-001.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ching-Nung Yang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yang, CN., Chen, PW., Shih, HW. et al. Aspect ratio invariant visual cryptography by image filtering and resizing. Pers Ubiquit Comput 17, 843–850 (2013). https://doi.org/10.1007/s00779-012-0535-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-012-0535-0

Keywords

Navigation