Professional Documents
Culture Documents
8, AUGUST 2009
659
(2
+ 1)
+1
+1
=2
Index TermsImage sharing, secret sharing, visual cryptography, visual secret sharing.
I. INTRODUCTION
ISUAL cryptography (VC), invented by Noar and Shamir
[1], is a method for protecting image-based secrets that
VC
has a computation-free decoding process. In the
scheme, the input image is transformed into noise-like shares
to ensure that the contained secret is unreadable. These shares
can be printed on transparent slides and distributed to the
participants. Any subset of or more shares can decrypt the
secret in the original image, but no information about the secret
can be obtained from fewer shares. The decryption process
in a VC scheme involves inspecting the stacked shares with
the unaided eye without computation. The ciphering model of
VC is similar to a one-time pad in the sense that each image
is decrypted with a different set of shares, and provides high
security to the protected secrets.
Following the pioneering research of Noar and Shamir, AteVC scheme to general acniese et al. [2] extended the
cess structures where the dealer can specify all qualified and
forbidden subsets of participants, with participants in a qualified subset being able to reveal the secret in the image and those
in a forbidden subset not being able to do so. In general, there
are two important parameters for a VC scheme: 1) the pixel expansion, which refers to the number of pixels in a share used to
Manuscript received January 15, 2009; revised March 29, 2009. Current version published May 28, 2009. This work was supported by the National Science
Council of Taiwan under Grant NSC96-2221-E-155-073. The associate editor
coordinating the review of this manuscript and approving it for publication was
Prof. H. Vicky Zhao.
The author is with the Department of Computer Science & Engineering, Yuan
Ze University, Chung-Li, Taoyuan 320, Taiwan (e-mail: rzwang@saturn.yzu.
edu.tw).
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org.
Digital Object Identifier 10.1109/LSP.2009.2021334
660
Let matrix
represent the basis matrix
for encoding a white pixel of the th level kernel, and
represent the basis matrix for encoding a black pixel of the th level
kernel. (The requirements of and methods for constructing
and
are discussed in Section III.) The collection of enand
for encoding white and black pixels,
coding matrices
respectively, at the th level are all of the matrices obtained by
and
. The following four
permuting the columns of
steps summarize the procedure for encoding a secret image S to
shares in our -level RIVC scheme.
1) Assign a secrecy level
to each pixel of S
according to the users specification.
2) Fetch a not-yet-processed pixel, , from S according to
the scanning order (e.g., from left to right and from top to
bottom).
3) Examine secrecy level of , and then proceed with one
of the following substeps:
3.1) If is a white pixel, randomly choose an encoding
matrix from the th level encoding matrices
and use
it to encode .
3.2) If is a black pixel, randomly choose an encoding
and
matrix from the th level encoding matrices
use it to encode .
4) Repeat Steps 2 and 3 until all of the pixels in S are proshares for our -level
cessed. This will yield the
RIVC scheme.
The secret decoding process is as simple as that in the tradishares,
tional VC scheme. Given a set of
carefully stacking and aligning them together will reveal the secrets to the unaided eye.
III. CONSTRUCTION OF AN
(2)
(3)
Stacking any two of the four shares reveals the first level secret with a contrast of 1/5; stacking any three shares reveals the
secrets at levels 1 and 2 with contrasts of 3/10 and 1/10, respectively; and stacking all four shares reveals all the secrets at levels
1, 2, and 3 with contrasts of 3/10, 1/10, and 1/10, respectively.
The basis matrices for constructing the four-level RIVC with
23-fold pixel expansion are
(4)
(5)
(1)
The same basis matrices are used to encode a white pixel in
the two level kernels, which guarantees that the number and locations of not-yet-revealed secrets remain invisible. Any single
contains two black and two
row in
(6)
661
Fig. 1. Results of an experiment with the proposed two-level RIVC scheme: (a) Secret image, (b) secrecy-level decomposition, (c)(e) three encoded shares,
(f)(h) superimposing any two of the three shares, and (i) superimposing all three shares.
Fig. 2. Results of an experiment with the proposed three-level RIVC scheme: (a) Secret image, (b) secrecy-level decomposition, (c)(f) four encoded shares,
(g)(l) superimposing any two of the four shares, (m)(p) superimposing any three of the four shares, and (q) superimposing all four shares.
662