Abstract
In visual cryptographic scheme (VCS), each secret pixel is expanded to m subpixels in shadow images to encrypt a secret image. Apparently, we should put these m subpixels as a rectangle such that the blocks can be arranged compactly with each other. However, if the aspect ratio is viewed as important information of the secret image, the distortion occurs at the case that m is not a square. An aspect ratio invariant VCS (ARIVCS) was accordingly proposed to address the arrangement of subpixels. However, the existing ARIVCSs relied on adding dummy subpixels to the shadow images. In addition, their method needs a mapping pattern that reduces the number of dummy subpixels, but how to design a mapping pattern is a huge challenge. In this paper, we propose an easy solution to construct ARIVCS by image filtering and resizing.
Similar content being viewed by others
References
Xie B, Kumar A, Zhao D, Reddy R, Bing H (2010) On secure communication in integrated heterogeneous wireless networks. Int J Inf Technol Commun Convergence 1:4–23
Wang SJ, Tsai YR, Shen CC, Chen PY (2010) Hierarchical key derivation scheme for group-oriented communication systems. Int J Inf Technol Commun Convergence 1:66–76
Sarkar P, Saha A (2011) Security enhanced communication in wireless sensor networks using Reed-Muller codes and partially balanced incomplete block designs. J Convergence 2:23–30
Malakuti S, Aksit M, Bockisch C (2011) Runtime verification in distributed computing. J Convergence 2:1–10
Wang ZH, Chang CC, Tsai PY (2010) Hiding secret data in an image using codeword imitation. J Inf Process Syst 6:435–452
Panganiban A, Linsangan N, Caluyo F (2011) Wavelet-based feature extraction algorithm for an iris recognition system. J Inf Process Syst 7:425–434
Naor M, Shamir A (1995) Visual cryptography. LNCS 950:1–12
Ito R, Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE Trans Fundam Elect Comm Comput Sci E82-A:2172–2177
Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recognit Lett 25:481–494
Cimato S, De Prisco R, De Santis A (2006) Probabilistic visual cryptography schemes. Comput J 49:97–107
Wang D, Yi F, Li X (2011) Probabilistic visual secret sharing schemes for grey-scale images and color images. Inf Sci 181:2189–2208
Shyu SJ, Huang SY, Lee YK, Wang RZ, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40:3633–3651
Feng JB, Wu HC, Tsai CS, Chang YF, Chu YP (2008) Visual secret sharing for multiple secrets. Pattern Recogn 41:3572–3581
Yang CN, Chung TH (2010) A general multi-secret visual cryptography scheme. Optics Commun 283:4949–4962
Lee KH, Chiu PL (2011) A high contrast and capacity efficient visual cryptography scheme for the encryption of multiple secret images. Optics Commun 284:2730–2741
Tsai DS, Chen TH, Horng G (2007) A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recogn 40:2356–2366
Yang CN, Peng AG, Chen TS (2009) MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty. Signal Process 89:1602–1624
Liu F, Wu CK, Lin XJ (2009) The alignment problem of visual cryptography schemes. Des Codes Crypt 50:215–227
Cimato S, De Santis A, Ferrara AL, Masucci B (2005) Ideal contrast visual cryptography schemes with reversing. Inf Process Lett 93:199–206
Yang CN, Wang CC, Chen TS (2008) Visual cryptography schemes with reversing. Comput J 51:710–722
Surekha B, Swamy G, Rao KS (2010) A multiple watermarking technique for images based on visual cryptography. Comput Appl 1:77–81
Monoth T, Anto PB (2010) Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput Sci 2:143–148
Weir J, Yan W (2010) Resolution variant visual cryptography for street view of Google maps. In: Proceedings of ISCAS 2006, pp 1695–1698
Yang CN, Chen TS, Ching MH (2006) Embed additional private information into two-dimensional barcodes by the visual secret sharing scheme. Integr Comput Aided Eng 13:189–199
Cimato S, Yang CN (2011) Visual cryptography and secret image sharing. CRC Press, Taylor & Francis, Boca Raton, FL, USA
Yang CN, Chen TS (2005) Aspect ratio invariant visual secret sharing with minimum pixel expansion. Pattern Recogn Lett 26:193–206
Yang CN, Chen TS (2006) Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recogn 39:1300–1314
Lin CC, Tsai WH (2003) Visual cryptography for gray-level images by dithering techniques. Pattern Recogn Lett 24:349–358
Hou JC (2003) Visual cryptography for color images. Pattern Recogn 36:1619–1629
Acknowledgments
This work was supported in part by Testbed@TWISC, National Science Council under the Grants NSC 100-2219-E-006-001.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yang, CN., Chen, PW., Shih, HW. et al. Aspect ratio invariant visual cryptography by image filtering and resizing. Pers Ubiquit Comput 17, 843–850 (2013). https://doi.org/10.1007/s00779-012-0535-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-012-0535-0