Abstract
Color visual cryptography makes things become real. In this chapter, we start from the basic color models and introduce multiple ways to present the color content using visual cryptographic techniques. Two visual shares of a color image could be superimposed together and the color secret could be restored using this simple operation. Color visual cryptography schemes open the door for applications and make the visual cryptography to be widely applied.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129:86–106
Ateniese G, Blundo C, Santis AD, Stinson DR (2001) Extended capabilities for visual cryptography. ACM Theor Comput Sci 250(1–2):143–161
Biham E, Itzkovitz A (1997) Visual cryptography with polarization. In: CRYPTO ’98
Blundo C, Santis A, Stinson DR (1999) On the contrast in visual cryptography schemes. J Crypt 12(4):261–289
Blundo C, Bonis A, Santis A (2001) Improved schemes for visual cryptography. Des Codes Crypt 24:255–278
Blundo C, D’Arco P, Santis A, Stinson DR (2003) Contrast optimal threshold visual cryptography schemes. SIAM J Discrete Math 16(2):224–261
Bose M, Mukerjee R (2010) Optimal \((k, n)\) visual cryptographic schemes for general \(k\). Des Codes Crypt 55:19–35
Chang CY (2000) Visual cryptography for color images. Masters Thesis, National Central University, Taiwan
Chen TH, Tsao KH, Wei KC (2008) Multiple-image encryption by rotating random grids. In: International conference on intelligent systems design and applications, vol 3, pp 252–256
Chen YF, Chan YK, Huang CC, Tsai MH, Chu YP (2007) A multiple-level visual secret-sharing scheme without image size expansion. Inf Sci 177:4696–4710
Cimato S, Prisco R, Santis A (2005) Optimal colored threshold visual cryptography schemes. Des Codes Crypt 35:311–335
Cimato S, Prisco RD, Santis AD (2006) Probabilistic visual cryptography schemes. Comput. J. 49(1):97–107
Cimato S, Prisco RD, Santis AD (2007) Colored visual cryptography without color darkening. Theor Comput Sci 374(1):261–276
Cimato S, Yang CN (2011) Visual cryptography and secret image sharing. CRC Press, Taylor & Francis, Boca Raton
Degara-Quintela N, Perez-Gonzalez F (2003) Visible encryption: using paper as a secure channel, security and watermarking of multimedia contents. In: Proceedings of SPIE’03 2003, vol 5020
Droste S (1996) New results on visual cryptography. In: CRYPTO’96, vol 1109. Springer, Berlin, pp 401–415
Fang WP (2009) Non-expansion visual secret sharing in reversible style. Int J Comput Sci Netw Secur 9(2):204–208
Floyd RW, Steinberg L (1976) An adaptive algorithm for spatial grey scale. In: Proceedings of the society of information display, vol 17, pp 75–77
Hou YC, Chang CY, Lin F (1999) Visual cryptography for colour images based on colour decomposition. In: Proceedings of 5th conference on information management, pp 584–591
Hou YC, Chang CY, Tu SF (2001) Visual cryptography for color images based on halftone technology. In: Proceedings of international conference on information systems, analysis and synthesis (World Multiconference on Systemics, Cybernetics and Informatics)
Hou YC (2003) Visual cryptography for color images. Pattern Recognit 36:1619–1629
Hou YC, Xu CS (2004) A probability-based optimization model for sharing multiple secret images without pixel expansion. J Inf Technol Soc 1:95–110
Hou YC, Tu CF (2004) Visual cryptography techniques for colour images without pixel expansion. J Inf Technol Soc 1:95–110
Hou YC, Tu SF (2005) A visual cryptographic technique for chromatic images using multi-pixel encoding method. J Res Pract Inf Technol 37(2):179–191
Hsu HC, Chen TS, Lin YH (2004) The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. Netw Sens Control 2:996–1001
Ishihara T, Koga H (2003) A visual secret sharing scheme for color images based on mean value-color mixing. IEICE Trans Fundam E86–A:194–197
Ito R, Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE Trans Fundam Elect Commun Comput Sci E82–A(10):2172–2177
Jin D (2003) Progressive color visual cryptography. Masters Thesis, National University of Singapore, Singapore
Katoh T, Imai H (1996) An extended construction method for visual secret sharing schemes. IEICE Trans J79–A(8):1344–1351
Kobara K, Imai H (1996) Limiting the visible space visual secret sharing schemes and their application to human identification. In: ASIACRYPT ’96. LNCS, 1163, Springer, pp 185–195
Koga H, Iwamoto M, Yamamoto H (2001) An analytic construction of the visual secret sharing scheme for color images. IEICE Trans Fundam 1:262–272
Koga H, Yamamoto H (1998) Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images. IEICE Trans Fundam 6:1262–1269
Koga H (2002) A general formula of the \((t, n)\)-threshold visual secret sharing scheme. In: LNCS 2501 (ASIACRYPT ’02), Springer, pp 328–345
Krause M, Hu S (2003) Determining the optimal contrast for secret sharing schemes in visual cryptography. Comb Probab Comput 12(3):285–299
Kuwakado H, Tanaka H (2004) Size-reduced visual secret sharing scheme. IEICE Trans Fundam E87–A(5):1193–1197
Lin CH (2002) Visual cryptography for color images with image size invariable shares. Masters Thesis, National Central University, Taiwan
Lukac R, Plataniostis KN (2004) Color image secret sharing. IEE Electron Lett 40(9):529–530
Naor M, Shamir A (1995) Visual cryptography. In: LNCS 950 (EUROCRYPT ’94), pp 1–12
Nakajima M, Yamaguchi Y (2002) Extended visual cryptography for natural images. In: WSCG conference, pp 303–412
Shyu SJ (2006) Efficient visual secret sharing scheme for color images. Pattern Recognit 39(5):866–880
Tuyls P, Hollman HDL, Van Lint JH, Tolhuizen L (2005) XOR-based visual cryptography schemes. Des Codes Crypt 37:169–186
Viet DQ, Kurosawa K (2004) Almost ideal contrast visual cryptography with reversing. In: Topics in cryptology - CT-RSA, pp 353–365
Weir J, Yan WA (2010) Comprehensive study of visual cryptography. Transactions on Data Hiding and Multimedia Security. Springer, Berlin
Wu C, Chen L A (1998) Study on visual cryptography. Masters Thesis, National Chiao Tung University, Taiwan
Wu XY, Wong DS, Li Q (2009) Threshold visual cryptography scheme for color images with no pixel expansion. In: Proceedings of the second symposium international computer science and computational technology (ISCSCT’09), pp 310–315
Yang CN, Laih CS (2000) New coloured visual secret sharing schemes. Des Codes Crypt 20:325–335
Yang CN, Chen TS (2008) Colored visual cryptography scheme based on additive color mixing. Pattern Recognit 41(10):3114–3129
Zhou Z, Arce GR, Crescenzo GD (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Liu, F., Yan, W.Q. (2014). Various Color Schemes of Visual Cryptography. In: Visual Cryptography for Image Processing and Security. Springer, Cham. https://doi.org/10.1007/978-3-319-09644-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-09644-5_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09643-8
Online ISBN: 978-3-319-09644-5
eBook Packages: Computer ScienceComputer Science (R0)