𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision)

✍ Scribed by Stelvio Cimato, Ching-Nung Yang


Publisher
CRC Press
Year
2011
Tongue
English
Leaves
532
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive dataβ€”such as medical records, financial transactions, and electronic voting systemsβ€”the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses: Potential for sharing multiple secrets Visual cryptography schemesβ€”based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images Inclusion of pictures in the distributed shares Contrast enhancement techniques Color-image visual cryptography Cheating prevention Alignment problems for image shares Steganography and authentication In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.

✦ Table of Contents


Visual Cryptography And Secret Image Sharing......Page 1
Digital Imaging And Computer Vision Series......Page 2
Visual Cryptography And Secret Image Sharing......Page 3
Dedication......Page 5
Contents......Page 6
List Of Figures......Page 14
List Of Tables......Page 25
Preface......Page 28
Contributors......Page 31
CONTENTS......Page 33
1.1.1 Visual Cryptography......Page 34
1.1.3 Blue Noise Error Diffusion......Page 35
1.2.1 Notion and Formal Definitions......Page 37
1.2.2 Construction of VSS Scheme......Page 40
1.3.1 Share Structure......Page 41
1.3.2 Distribution of SIPs and ABPs......Page 43
1.3.3 Generation of Halftone Shares via Error Diffusion......Page 46
1.4 Halftone VSS Construction Using Parallel Error Diffusion......Page 48
1.5 Quality of Halftone Shares......Page 49
1.6.3 Image Decoding......Page 51
1.7 Simulation Results......Page 52
1.8 Conclusion......Page 58
Bibliography......Page 59
CONTENTS......Page 62
2.2.1 Color Vision and Color Models......Page 63
2.2.2 Lattices......Page 68
2.2.3 The Darkening Problem......Page 69
2.2.5 The Identity Color......Page 70
2.3.2 The Models for Color-VC......Page 71
2.3.3 The SC, ND, and General Models......Page 74
2.4 Schemes for the SC Model......Page 75
2.4.1 The VV Schemes......Page 76
2.4.3 The KY and YL Schemes......Page 78
2.4.4 The CDD Schemes and a Lower Bound......Page 79
2.5 Schemes for the ND Model......Page 81
2.6.1 (2; 2)-Threshold Schemes......Page 83
2.7 Other Schemes......Page 85
2.8 Conclusions......Page 86
Bibliography......Page 87
3.1 Introduction......Page 88
3.2 Naor and Shamir's Basic Visual Secret Sharing Scheme......Page 90
3.3.1 Wu and Chen's Scheme......Page 93
3.3.2 Wu and Chang's Scheme......Page 95
3.4.1.1 Informal Description......Page 99
3.4.1.2 Encoding Circle Share A......Page 100
3.4.1.3 Encoding Circle Share B......Page 102
3.4.1.4 General Algorithm......Page 111
3.4.2 Feng et al.'s Scheme......Page 114
3.4.3 Experimental Results......Page 116
3.4.4 Comparison and Discussions......Page 118
3.5 Concluding Remarks......Page 122
Bibliography......Page 123
CONTENTS......Page 125
4.2.1 (k; n) Visual Secret Sharing Schemes......Page 126
4.2.2 Extended Visual Cryptography Scheme......Page 129
4.2.3 Random Grids......Page 131
4.3.1 Digital Halftoning......Page 133
Ordered Dither......Page 134
Iterative and Search-Based Methods......Page 135
4.3.2 Image Quality and Related Parameters......Page 136
4.3.3 Photograph Visual Cryptography with Basic Schemes......Page 137
4.4.1 Approaches to Photograph Visual Cryptography......Page 139
4.4.3 Similar Shadow Images......Page 141
4.4.4 Positive and Negative Shadow Images......Page 142
4.4.5 Error and Secret Di usion......Page 143
4.4.7 Tone Adjustment......Page 144
4.4.8 Continuous-Tone Subpixel......Page 145
4.5.1 Theory and Implementation......Page 146
4.6 Conclusions......Page 150
Bibliography......Page 153
5.1 Introduction......Page 157
5.2.1 The Deterministic Model......Page 159
5.2.2 The Probabilistic Model......Page 161
5.3 Canonical Probabilistic Schemes......Page 163
5.4 Probabilistic Schemes with No Pixel Expansion......Page 165
5.5.1 Probabilistic Schemes with Given Pixel Expansion......Page 168
5.6.1 (n; n)-Threshold Probabilistic Schemes with Any Pixel Expansion......Page 172
5.6.2 (2; n)-Threshold Probabilistic Schemes with Any Pixel Expansion......Page 174
5.7.1 (2,n) Scheme for Binary Images (Wang)......Page 177
5.7.2 (n,n) Scheme for Binary Images (Wang)......Page 179
5.8 Conclusions and Open Problems......Page 180
Bibliography......Page 181
6.1 Introduction......Page 184
6.2 Preliminaries......Page 185
6.3.1 (2, n) Scheme......Page 187
6.3.3 (k, n) Scheme......Page 188
6.4.1 (k, n) VC Scheme Using Cyclic-Shift Operation......Page 197
6.4.2 A Scheme for General Access Structure......Page 200
6.5 Secret Sharing Scheme Using Boolean Operation......Page 203
6.5.1 (2, n) Scheme......Page 204
6.5.2 (n, n) Scheme......Page 205
6.5.3 (k, n) Scheme......Page 207
Bibliography......Page 210
7.1 Introduction......Page 213
7.2.1 Random Pixel, Random Grid, and Average Light Transmission......Page 214
7.2.2 Superimposition of Random Grids......Page 215
7.3.1 Definition of VCRG......Page 217
7.3.2 (2, 2)-VCRG Algorithms for Binary Images......Page 218
7.3.3 Experiments for (2, 2)-VCRG......Page 221
7.3.4 Definition of Light Contrast and Performance Evaluation......Page 222
7.3.5 Algorithms of (n; n)-VCRG for Binary Images......Page 224
7.3.6 Algorithms of (n; n)-VCRG for Gray-Level and Color Images......Page 234
7.3.7 Experiments for (n; n)-VCRG......Page 235
7.4 Concluding Remarks......Page 247
Bibliography......Page 248
8.1 Introduction......Page 250
8.2 Preliminaries......Page 252
8.3 Approximate Inclusion Exclusion......Page 254
8.4 Designs and Codes......Page 259
8.5 Optimal 3-out-of-n Schemes......Page 263
8.6 Asymptotic Optimal k-out-of-n Schemes......Page 268
8.7 Contrast Trade-O s for Extended Visual Cryptography Schemes......Page 271
8.9 Conclusion......Page 278
Bibliography......Page 279
9.1 Introduction......Page 281
9.2 Visual Cryptography Schemes......Page 284
9.2.1 (k; k)-Threshold Visual Cryptography Schemes......Page 285
9.2.2 Perfect Black Visual Cryptography Schemes......Page 286
9.3 Almost Ideal Contrast VCS with Reversing......Page 288
9.4 Ideal Contrast VCS with Reversing......Page 291
9.4.1 A Construction Using a Binary Secret Sharing Scheme......Page 292
9.4.2 Constructions Using Perfect Black VCSs......Page 294
9.4.2.1 The Scheme by Cimato, De Santis, Ferrara, and Masucci......Page 295
9.4.2.2 The Scheme by Hu and Tzeng......Page 297
9.4.2.3 The Scheme by Yang, Wang, and Chen......Page 300
9.4.3 A Construction Using a Nonperfect Black VCS......Page 302
Bibliography......Page 304
10.1 Introduction......Page 306
10.2.1 Visual Cryptography......Page 307
10.2.2 Cheating in VC......Page 310
10.3.1 HCT1 and HCT2......Page 312
10.3.2 HT......Page 314
10.3.3 TCH......Page 315
10.3.4 PS1 and PS2......Page 317
10.4 Analysis of Cheating Prevention Schemes......Page 319
Bibliography......Page 320
11.1 Introduction......Page 322
11.2 Preliminaries......Page 324
11.3 Misalignment with Integer Number of Subpixels......Page 327
11.4 Misalignment with Less Than One Subpixel......Page 334
11.4.1 Shares with Slightly Misalignment Can Still Recover the Secret Image......Page 335
11.4.2 Large Subpixels Have Better Misalignment Tolerance......Page 341
11.5.1 The Algorithm......Page 344
11.5.2 Simulations......Page 347
Bibliography......Page 350
12.1 Introduction......Page 353
12.2 Trojan-Secure Confirmation of Transactions......Page 357
12.3 Trojan-Secure Authentication Using a PIN......Page 358
12.4 Security versus Multiple Use......Page 363
12.5 Using Refraction......Page 367
12.6 Technical Problems Concerning Adjustment and Parallaxes......Page 370
12.7 Voting with a Receipt Based on Visual Cryptography......Page 371
Bibliography......Page 373
13.1 Introduction......Page 375
13.2 A Review of Error Diffusion......Page 376
13.3 Data Hiding by Stochastic Error Diffusion (DHSED)......Page 380
13.4 Data Hiding by Conjugate Error Diffusion (DHCED)......Page 383
13.5 Performance Analysis......Page 387
13.6 Summary......Page 401
Bibliography......Page 403
14.1 Introduction......Page 405
14.2 State of the Art......Page 408
14.3.2 Color Image Sharing Based on the Lagrange Interpolation......Page 413
14.3.3 Color Image Sharing Based on Moving Lines......Page 416
14.3.4 Improved Algorithm......Page 420
14.4 Experiment and Evaluation......Page 421
14.5 Conclusion......Page 423
Bibliography......Page 424
CONTENTS......Page 427
15.1 Introduction......Page 428
15.2.1 Shamir's Secret Sharing Scheme......Page 429
15.2.2 Lagrange Interpolation Scheme......Page 430
15.3.2 Lin-Tsai Scheme......Page 431
15.3.4 Inverted Pattern LSB Scheme......Page 433
15.3.5 Scalable Secret Image Sharing......Page 434
15.4.1 Secret Image Sharing......Page 436
15.4.2 Set-Up Authentication......Page 438
15.4.3 Main Algorithms......Page 440
15.5.1 Fidelity Analysis......Page 442
15.5.2 Evaluating Authentication......Page 443
Bibliography......Page 447
16.1 Introduction......Page 449
16.2.1 Lin and Tsai's Scheme......Page 452
16.2.2 Yang et al.'s Scheme......Page 454
16.2.3 Chang et al.'s Scheme......Page 456
16.3.1 Error Di usion Technique......Page 458
16.3.2 Interpolation Technique......Page 463
16.3.3 Canny Edge Detector......Page 464
16.3.4 Edge Lookup Inverse Halftoning Technique......Page 465
16.3.5 Shamir Scheme for Secret Sharing......Page 467
16.4.1 Sharing and Embedding Phase......Page 469
16.4.2 Reconstruction and Verifying Phase......Page 473
16.5 Experimental Results......Page 477
16.6 Conclusions......Page 482
Bibliography......Page 483
17.1 Introduction......Page 486
17.2.1 PISSS......Page 488
17.2.2 VCS......Page 489
17.3.2 Lin and Lin's TiOISSS......Page 491
17.4 A New (k; n)-TiOISSS......Page 493
17.4.1 Design Concept......Page 494
17.4.2 The Lossless TiOISSS......Page 496
17.5 Experimental Results and Comparisons......Page 501
17.6 Conclusion......Page 504
Bibliography......Page 507
Index......Page 510
Color Insert......Page 525


πŸ“œ SIMILAR VOLUMES


Visual cryptography and secret image sha
✍ Cimato, Stelvio; Yang, Ching-Nung (eds) πŸ“‚ Library πŸ“… 2012 πŸ› CRC Press 🌐 English

"With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a com

Foundations of Computer Vision: Computat
✍ James F. Peters πŸ“‚ Library πŸ“… 2017 πŸ› SPRINGER 🌐 English

<p>This book introduces the fundamentals of computer vision (CV), with a focus on extracting useful information from digital images and videos. Including a wealth of methods used in detecting and classifying image objects and their shapes, it is the first book to apply a trio of tools (computational

Foundations of Computer Vision: Computat
✍ James F. Peters (auth.) πŸ“‚ Library πŸ“… 2017 πŸ› Springer International Publishing 🌐 English

<p><p>This book introduces the fundamentals of computer vision (CV), with a focus on extracting useful information from digital images and videos. Including a wealth of methods used in detecting and classifying image objects and their shapes, it is the first book to apply a trio of tools (computatio