Visual Cryptography by Random Grids with Identifiable Shares

This paper proposes a visual cryptography by random grids scheme with identifiable shares. The method encodes an image O in two shares that exhibits the following features: (1) each generated share has the same scale as O, (2) any share singly has noise-like appearance that reveals no secret information on O, (3) the secrets can be revealed by superimposing the two shares, (4) folding a share up can disclose some identification patterns, and (5) both of the secret information and the designated identification patterns are recognized by naked eye without any computation. The property to show up identification patterns on folded shares establishes a simple and friendly interface for users to manage the numerous shares created by VC schemes.




References:
[1] M. Naor and A. Shamir, "Visual cryptography," Advances in
Cryptography: Eurocrypt-94, pp. 1-12, 1995.
[2] G. Ateniese, C. Blundo, A. De Santis, and D.R. Stinson, "Visual
cryptography for general access structures," Information and
Computation, Vol. 129, No. 2, pp. 86-106, 1996.
[3] C. Blundo and A. De Santis and D.R. Stinson, "On the contrast in visual
cryptography schemes," Journal of Cryptology, Vol. 12, No. 4, pp.
261-289, 1999.
[4] Y.C. Hou, "Visual cryptography for color images," Pattern Recognition,
Vol. 36, No. 7, pp. 1619-1629, 2003.
[5] C.C. Lin and W.H. Tsai, "Visual cryptography for gray-level images by
dithering techniques," Pattern Recognition Letters, Vol. 24, pp. 349-358,
2003.
[6] Z. Zhou, G.R. Arce, and G.D. Crescenzo, "Halftone visual cryptography,"
IEEE Transactions on Image Processing, Vol. 15, No. 8, pp. 2441-2453,
2006.
[7] W.P. Fang and J.C. Lin, "Visual cryptography with extra ability of hiding
confidential data," Journal of Electronic Imaging, Vol. 15, No. 2,
0230201-0230207, 2006.
[8] R.Z. Wang, Region Incrementing Visual Cryptography, IEEE Signal
Processing Letters, Vol. 16, No. 8, pp. 659-662, 2009.
[9] M. Gnanaguruparan and S. Kak, "Recursive hiding of secrets in visual
cryptography," Cryptologia, Vol. 26, pp. 68−76, 2002.
[10] O. Kafri and E. Keren, "Encryption of pictures and shapes by random
grids," Optics Letters, Vol. 12, no. 6, pp. 377-379, 1987.
[11] R. Ito, H. Kuwakado, and H. Tanaka, "Image Size Invariant Visual
Cryptography," IEICE Transactions on Fundamentals of Electronics,
Communications and Computer Science, E82, No. 10, pp. 2172-2177,
1999.
[12] C.N. Yang and T.S. Chen, "Aspect ratio invariant visual secret sharing
schemes with minimum pixel expansion," Pattern Recognition Letters,
Vol. 26, No. 2, pp. 193-206, 2005.
[13] C. Blundo, S. Cimato and A.D. Santis," Visual cryptography schemes
with optimal pixel expansion," Theoretical Computer Science, Vol. 369,
pp. 169-182, 2006.
[14] S.J. Shyu, "Image encryption by random grids," Pattern Recognition, Vol.
40, No. 3, pp. 1014-1031, 2007.
[15] S.J. Shyu, "Image encryption by multiple random grids," Pattern
Recognition, Vol. 42, No. 7, pp. 1582-1596, 2009.
[16] T.H. Chen, and K.H. Tsao, "Visual cryptography by random grids
revisited," Pattern Recognition, vol. 42, pp. 2203-2217, 2009.
[17] T.H. Chen, K.H. Tsao and K.C. Wei, "Multiple-Image Encryption by
Rotating Random Grids," Proceedings of the 9th Inter. Conf. on Intel.
Systems Design and Applications, pp. 252-256, 2009.