Professional Documents
Culture Documents
2, FEBRUARY 2019
Abstract— In visual cryptography (VC) for grayscale image, the secret image can be reconstructed with sufficient fidelity
size reduction leads to bad perceptual quality to the reconstructed and can be identified by the human visual system (HVS). But
secret image. To improve the quality, the current efforts are for other groups of participants, i.e., those in the forbidden
limited to the design of VC algorithm for binary image, and
measuring the quality with metrics that are not directly related sets, no information about the secret should be recovered
to how the human visual system perceives halftone images. from the shares. The first requirement of VC is called the
We propose an analysis-by-synthesis (AbS) framework to integrate contrast condition, and the second one is called the security
the halftoning process and the VC encoding: the secret pixel/block condition. In a (k, n)-threshold VC, any group with d < k
is reconstructed from the shares in the encoder and the error participants belongs to the forbidden set, and any group
between the reconstructed secret and the original secret images
is fed back and compensated concurrently by the error diffusion with d ≥ k participants belongs to the qualified set.
process. In doing so, the error between the reconstructed secret As a cryptography algorithm, the security condition is a
and original secret is pushed to high frequency band, thus hard constraint: if the security condition is violated, then the
producing visually pleasing reconstructed secret image. This system is considered as unacceptable. So when designing the
framework is simple and flexible in that it can be combined VC algorithm for grayscale images, one should optimize the
with many existing size-invariant VC algorithms, including
probabilistic VC, random grid VC, and vector/block VC. More visual quality subject to security constraint. This is different
importantly, it is proved that this AbS framework is as secure as from some information hiding systems for halftone image that
the traditional VC algorithms. Experimental results demonstrate use superposition for watermark decoding, where the fidelity
the effectiveness of the proposed AbS framework. is optimized with no security constraint [2].
Index Terms— Size-invariant visual cryptography, grayscale Improving the quality of the reconstructed secret image
image, visual quality, analysis-by-synthesis (AbS), vector visual (which will be referred to as the target image in this paper)
cryptography. and reducing the size expansion have been the focuses of
VC research in recent years. VC with small or no size
I. I NTRODUCTION expansion is usually preferred since it imposes less burden
on processing, storage and transmission of the shares. Many
V ISUAL cryptograph (VC) is a secret sharing technique,
where the decoding is done by stacking of shares [1]. The
secret holder splits his secret image into n shares, prints them
algorithms were proposed for size-invariant VC, including
the random grid (RG) algorithms [3]–[5], probabilistic algo-
onto transparencies, and then distributes the transparencies rithms [6], [7], and block encoding algorithms [8], [9]. How-
to n participants. For some designated groups of participants ever, it is observed that reducing the size expansion brings low
(the qualified sets), if they superimpose their transparencies, perceptual quality to the target image, especially for grayscale
secret images.
Manuscript received June 14, 2016; revised May 22, 2017, July 9, 2018, Grayscale VC generates n binary share images from a
and September 29, 2018; accepted October 2, 2018. Date of publication grayscale secret image. This paper focuses on improving the
October 8, 2018; date of current version October 22, 2018. This work was
supported in part by the National Natural Science Foundation of China visual quality of the recovered secret image under this setting.
(NSFC) under Grant 61272432, in part by the Shandong Provincial Natural This focus is different from previous works on improving the
Science Foundation under Grant ZR2014JL044, in part by the Australian visual quality of the share images in extended VC [10], [11],
Research Council under Grant LP170100458, and in part by the Hubei
Provincial Natural Science Foundation of China under Grant 2018CFB225. where the secret image is a simple binary logo image. This
The associate editor coordinating the review of this manuscript and approv- focus is also different from the work in [12] where the secret
ing it for publication was Prof. Patrick Le Callet. (Corresponding author: image is a binary image from thresholding a grayscale image.
Yong Xiang.)
B. Yan is with the College of Electronics, Communication and Physics, Furthermore, we focus on the strict sense VC, where decoding
Shandong University of Science and Technology, Qingdao 266590, China is done by stacking, not by XOR operation [13].
(e-mail: yanbinhit@hotmail.com). The current researches on size-invariant grayscale VC can
Y. Xiang is with the School of Information Technology, Deakin University,
Melbourne, VIC 3125, Australia (e-mail: yxiang@deakin.edu.au). be categorized into two frameworks:
G. Hua is with the School of Electronic Information, Wuhan University, • Separate halftoning and VC encoding [8], [14]–[18].
Wuhan 430072, China (e-mail: ghua@whu.edu.cn). The grayscale secret image is first halftoned or simply
Color versions of one or more of the figures in this paper are available
online at http://ieeexplore.ieee.org. quantized by two level quantizer to generate a binary
Digital Object Identifier 10.1109/TIP.2018.2874378 image (These two types of binary images will be called
1057-7149 © 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
YAN et al.: IMPROVING THE VISUAL QUALITY OF SIZE-INVARIANT VC FOR GRAYSCALE IMAGES: AbS APPROACH 897
halftone image and thresholded image, respectively). The contributions of this work can be summarized as
Then the various size-invariant VC algorithms for binary follows:
image can be applied to this binary image. This category • An AbS framework for (n, n)-threshold VC, having
encompasses most of the existing algorithms. significantly improved quality of the target image, and
• Direct block quantization and mapping [9], [19]. The satisfying the security condition (in the sense of per-
average intensity of a small block is quantized to different fect secrecy). Using this framework, we also provide
levels, and these levels are in turn represented by different detailed algorithms for AbS-based probabilistic VC and
binary patterns in the target image to approximate the AbS-based vector VC.
local intensity. • Introducing and designing of quality metrics for the target
Two major problems exist in these frameworks. First, image that are relevant to the HVS. We introduce the
an inherent lossy mapping from the secret pixel/block to quality metric, radially averaged power spectrum density
the reconstructed pixel/block (which will be referred to as (RAPSD), that is traditionally not used in evaluating the
the target pixel/block/vector) is not compensated by other quality of target image in VC. In addition, we design a
pixels/blocks. Due to the security condition, the target image new metric, the residual variance, to quantify the level
has limited ability in representing the binary secret image. So of residual noise in the frequency band to which HVS is
from the secret block to the target block, there is a many-to- sensitive.
one lossy mapping. This paper is organized as follows. We formulate the size-
Second, the perceptual quality of the target image is not invariant grayscale VC problem in section II. The AbS-based
directly addressed, or the metrics used do not reflect how the probabilistic VC and AbS-based vector VC are presented in
HVS perceives a halftone image. In particular, the important sections III and IV, respectively, along with the corresponding
spectral property of the target image is not considered in the experimental results. The conclusion is given in section V.
design and evaluation of VC algorithms. The block variance
II. P ROBLEM F ORMULATION
and global contrast are two commonly used quality metrics.
The block variance is not a metric for measuring the qual- In this section, we first define the security condition and
ity of halftone target image [8], [14]. The global contrast contrast condition for size-invariant VC with grayscale secret
metric is also designed for binary secret image. Recently, image. Then, we present our general AbS framework.
efforts have been made to produce blue noise patterns on
A. Representing Pixel on Transparency by Light
shares [17]. However, the stacking or random sampling of
Transmittance
two blue noise shares is no longer blue noise. So this
type of algorithms work well only on thresholded grayscale In VC, ‘1’ (‘0’ resp.) is used to denote a black (white resp.)
image. pixel, and the stacking operation is logic ‘OR’. This is
To address the two problems outlined above, we propose advantageous for binary VC. But it is not directly related to
an analysis-by-synthesis (AbS) framework: the encryption of the physical quantities that characterize the light transmission
the secret image into shares is considered as an analysis through the transparencies or intensity of light from a display
step, while the stacking of the shares to reconstruct the device. So it is not suitable for joint halftoning and VC.
secret image (i.e., the target image) is a synthesis step. This paper uses light transmittance to represent pixels on
In AbS, we let the target image to be fed back to the analysis transparencies or display devices, which is also convenient for
process, so that the difference between the current target developing multitone VC.
block/pixel and the grayscale secret block/pixel is known to the Light transmittance is the ratio between the intensity of
encryption process. Then, the halftoning in encryption process the outgoing light and the intensity of the incoming light.
can adjust its strategy in producing the binary block/pixel to A region with light transmittance 0 ≤ β ≤ 1 lets only a
the VC encoder, in order to compensate for this difference. proportion of β of the incoming intensity to appear in the
Specifically, we put the VC encryption and decoding stages outgoing light. A white pixel is represented by β = 1, while
into the loop of error diffusion-based halftoning. This error for a black pixel β = 0. This representation is convenient for
diffusion is different from the error diffusion in ordinary joint halftoning and VC encryption. Furthermore, extension to
halftoning. It is not the error between the halftone image and multitone printing is straightforward. If we stack two points
the grayscale image that is fed back, but the error between the having light transmittances β1 and β2 , respectively, then the
original secret image and the target image (whose quality is resulting transmittance is β1 β2 .
of concern) that is fed back. Denote vectors and matrices by boldface letters. The
This AbS framework is quite flexible in that it can be used grayscale secret image J [n] is of M rows and N columns,
in any (n, n)-threshold scheme, including probabilistic VC, where n = [nr , n c ] is the two dimensional index with row
random grid VC and block VC. The resulting system is index nr and column index n c . It should be noted that n is
perfectly secure if the basic VC algorithm is perfectly secure. used to denote the number of shares in VC.
Since a local or temporary stacking result needs to be fed back
to the halftoning stage, this framework is suitable for error B. Definition of Size-Invariant VC for Grayscale Image
diffusion-based halftoning and halftoning using direct binary The general structure for a grayscale VC system is shown
search (DBS), but is not suitable for halftoning using ordered in Fig. 1. The secret image J [n] is a grayscale image.
dithering. It is divided into n share images s1 [n] , · · · , sn [n] by the
898 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 28, NO. 2, FEBRUARY 2019
VC encoder. These share images are binary images with Fig. 2. The block diagram of the proposed framework.
meaningless appearance, and are printed on transparencies.
The VC decoder can recover the content of the secret image
by simply stacking the shares. The reconstructed secret image random vector f si1 [n] , · · · , sid [n] , where = 1, 2,
(i.e., the target image) Jˆ [n] is obtained from
no additional information about J [n] can be derived,
n
i.e., Pr {J [n] = a} = Pr {J [n] = a | f }, ∀a ∈ C.
Jˆ [n] = si [n] . (1) Remark 1: The requirement that the distributions of f1
i=1 and f2 are independent of n is to ensure that the pixels on
In this work, we focus on the design of grayscale VC encoder. the same share are independent of each other. This definition
Before designing the size-invariant VC for grayscale image, is also valid for multitone shares [20].
we need to identify and define the desired properties of this
VC system. More specifically, we focus on such a system with C. The Proposed Framework
halftone/multitone share images. The definition is motivated by
The proposed framework is illustrated in Fig. 2. The
the specialty of the halftone/multitone share images. Given a
VC encryption and stacking are done in a pixel/block-by-pixel/
constant grayscale image J [n] = g, ∀n and the corresponding
block basis. The input image J [n] is mapped by gamut map-
halftone image I [n], and suppose that the set of colors
ping to account for the difference between the input gamut and
on the halftone image is D = {g1 , · · · , g }. The marginal
output gamut. After that, the mapped image x [n] is halftoned
distribution
of color gi on I [n] is Pr {I [n] = gi } = pi , and
and then encrypted by VC to generate the share images
i=1 pi = 1. Then the halftone image I [n] should satisfy s1 , · · · , sn . These share images are stacked in the encoder to
E (I [n]) = g, where E is the mathematical expectation. Moti-
get the target image ŷ [n]. This synthesis result is fed back
vated by this random process model, we give the following
to the digital halftoning process, so as to compensate for the
definition of size-invariant VC for grayscale secret image with
difference between y [n] and ŷ [n]. This can be formulated as
halftone/multitone shares (size-invariant grayscale multitone
an optimization problem.
VC, or SIGM-VC).
Let the mapping from y [n] to ŷ [n] be denoted as
Definition 1 ((k, n, g, c)-SIGM-VC): Let the set of colors/
ŷ [n] = S (y [n]). Due to the security constraint of the basic
grayscales of the secret image be C, and those used by the
VC algorithm, this mapping is stochastic. For example,
VC encoder be E. Define g to be the number of colors in C,
in the (2, 2)-threshold probabilistic VC [21], we have:
and define c to be the number of colors in E, i.e., g = |C|
Pr( ŷ [n] = 0 | y [n] = 0) = 1, and Pr( ŷ [n] = 0 | y [n] =
and c = |E|. Given two grayscale images, each having
1) = Pr( ŷ [n] = 1 | y [n] = 1) = 21 . In order to retain the
constant grayscales: J1 [n] = g1 and J2 [n] = g2 , and
security of the original binary VC, we keep the VC encryption
0 1≤ g1 < g21 ≤ 1. Each image is divided into n shares:
algorithm intact and carefully change the input to the
s1 [n] , · · · , sn [n] , s12 [n] , · · · , sn2 [n] , and si ∈ E. If the
VC encryption, i.e., y [n]. By doing so, we intend to minimize
following two conditions are satisfied, then the secret sharing
the perceived difference between the target image ŷ [n] and
algorithm is called a grayscale multitone VC.
the original secret image x [n] (after gamut mapping). So we
1) Contrast Condition: Let i 1 , · · · , i k be k participants, then
have the following stochastic optimization problem:
the stacking of the k shares
ik min [w ⊗ (S (y) − x) [n]]2 , (4)
y
ŷ [n] si [n] , = 1, 2, (2) ∀n
i=i1 where ⊗ denotes convolution and w is the filter model of HVS,
such as the alpha stable model [22]. Note that the problem
satisfies E ŷ1 [n] < E ŷ2 [n] .
2) Security Condition: Let i 1 , · · · , i d be d participants and in (4) is different from the ordinary halftoning. In ordinary
d < k, then, ∀n, the following two random vectors are halftoning, one intends to minimize
the perceived difference
equivalent: between y and x, i.e., min ∀n (w ⊗ (y − x) [n])2 , which
T T is a deterministic optimization problem. Note also that our
f1 = si11 [n] , · · · , si1d [n] , f2 = si21 [n] , · · · , si2d [n] , formulation is different from the halftone watermarking model
in [23] where the security condition in VC is not considered.
(3)
As with ordinary halftoning, one can elaborate on a
i.e., they have the same sample space and probability dis- DBS algorithm to solve this stochastic optimization prob-
tribution, and are independent of n. Equivalently, given the lem. But DBS is computationally expensive. A good balance
YAN et al.: IMPROVING THE VISUAL QUALITY OF SIZE-INVARIANT VC FOR GRAYSCALE IMAGES: AbS APPROACH 899
between performance and complexity is the error diffusion Algorithm 1 (n, n)-AbSProb: AbS-Based Probabilistic
algorithm. So we focus on error diffusion-based solution to the VC for Grayscale Images
problem in (4). The block diagram is shown in Fig. 3. In this
framework, the HVS model w is implicitly incorporated into
the diffusion filter and error diffusion model.
A. Overall Structure
The structure of the AbS-based probabilistic VC is
The affine mapping G A can retain the relative contrast
shown in Fig.3. The corresponding algorithm is summarized
between adjacent gray levels. In addition, its parameters are
in Algorithm 1. Construction of the basic matrices for
easier to determine than nonlinear mappings. Let G A be
(n, n)-threshold VC can be found from [6], [7]. In this work,
we use the construction from [7], resulting in average contrast G A : x = k J + b, (5)
of 1/2n−1 .
1) Gamut Mapping: The Gamut Mapping step is to ensure then the parameters k and b can be determined as:
that the system is stable in BIBS (bounded input bounded
βt − β1 β1 Jmax − βt Jmin
state) sense, i.e., to ensure that the error e [n] is bounded. k= , b= . (6)
To achieve this, the dynamic range of the input should be Jmax − Jmin Jmax − Jmin
bounded by the convex hull of the colors at the output of the If the original secret image is of bad contrast due to
loop [23], [25]. Let the dynamic range of the input image J [n] bad illumination during image acquisition, then histogram
be [ Jmin , Jmax ], and the set of colors on the target image equalization may be needed to enhance the details. So the
be D = {β1 , · · · , βt : β1 < · · · < βt }. Then the convex hull nonlinear gamut mapping G N considered here is an affine
of the output color is simply [β1 , βt ]. A gamut mapping mapping combined with histogram equalization. Let the his-
G : [ Jmin , Jmax ] → [β1 , βt ] is needed to limit the dynamic togram of the original secret image be p( j ) with its support
range of the input to the error diffusion loop. We consider on [ Jmin , Jmax ]. Then, after the affine transformation
z =
two gamut mappings: an affine mapping G A and a special k J + b, the histogram of z is pz (z) = p z−bk with its support
nonlinear mapping G N . on [β1 , βt ]. Finally, after equalization G E : z → x,
900 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 28, NO. 2, FEBRUARY 2019
βt = ρ · E{ ŷ [n] |y [n] = 1}, where the parameter 0 < ρ ≤ 1 Pr {x [n] | sd } = Pr {x [n] , y [n] | sd }
is used to control the upper bound of the input gamut. With y[n]∈E
the decrease of ρ, the probability of out-gamut-pixel becomes
From our experiments, we found that setting ρ = 1 produces = Pr {y [n]} Pr {x [n] | y [n]} (10)
satisfactory result while keeping the global dynamic range as y[n]∈E
high as possible. = Pr {x [n]} .
2) Diffusion Kernel: The error diffusion kernel h [n] can
From (9) to (10), we use the result in (8) and the one-step
be any stable blue noise diffusion kernel, such as the Floyd
dependence property of the Markov chain. So we conclude
and Steinberg’s kernel [26], the Jarvis’ kernel [27], or the
that, if the probabilistic VC is perfectly secure, then our
Stucki’s kernel [28]. Although the diffusion kernel can also
AbS-based probabilistic VC is also perfectly secure, i.e., given
be optimized or made adaptive, this issue is out of the scope
any d < n shares, no additional information of x [n] can be
of the current paper.
derived.
Furthermore, even though y [n] may have spatial depen-
dency, the pixels on one share are independent of each other
B. Theoretical Validation
from the property of the basic ProbVC.
We show that Algorithm 1 is a valid construction of Contrast Condition: To show the contrast condition in
(n, n, g, 2)-SIGM-VC. The proof of this result hinges on Definition 1, we need to find E ŷ [n] . For this purpose, a sta-
the contrast property and the security property of the basic tistical model for the binary quantizer is needed. For binary
(n, n)-ProbVC [7]. We summarize them as a Lemma. quantizer, the quantization error y [n] − x̂ [n] is correlated
Lemma 1: Let the set C0 (C1 resp.) contains all the column with the input x̂ [n]. A linear model y [n] = γ x̂ [n] + q [n]
vectors from the basic matric B0 (B1 resp.) in deterministic can characterize this dependency [30]. The coefficient γ can
VC [1]. When sharing a black (white resp.) pixel, the encoder be determined by least square fitting between the model
randomly choose one vector from C0 (C1 resp.), and ran- and the quantizer input/output data [31]. For natural image,
domly permute the rows, then assign one row to each share. γ may vary from image to image. For constant input image,
Then, the (n, n)-ProbVC scheme in [7] satisfies the follow- γ also depends on the input level g. The term q [n] is the
ing contrast and security conditions. i) Contrast condition: part of the quantizer error that cannot be described by the
Stacking
all the n shares, the stacking result ŷ [n] satisfies
linear correlation term, and is assumed to be independent of
Pr ŷ [n] = 1|y [n] = 1 ≥ pTH , Pr ŷ [n] = 1|y [n] = 0 ≤ the input x̂ [n]. Based on this quantizer model, a simplified
pTH − α, where pTH is a threshold
and α > 0. ii) Security and equivalent block diagram for Fig. 3 is derived, as shown
condition: ∀ subset i 1 , · · · , i q ⊂ {1, 2, · · · , n} with q < n, in Fig. 4.
the two sets obtained by restricting each vector in C0 and C1 When n shares are stacked, the combined effect of
to the rows i 1 , · · · , i q , contain the same vectors with the same VC encryption and simulated stacking in Fig. 3 can be
frequencies. modelled as a probabilistic non-symmetric binary channel.
Proof: The proof of Lemma 1 can be found in [7]. Here we only need E( ŷ [n]). From the contrast condition of
Furthermore, The pixels on one share are independent of each the (n, n)-ProbVC, we have E( ŷ [n]) = κ · E(y [n]), where
other, due to the randomization in ProbVC encoding. κ = 2n−11
(See [7, Th. 3]). This implies that, if we focus on
Theorem 1: The construction of (n, n)-AbSProb algorithm the expected value of all the signals, then the equivalent system
in Algorithm 1 is a valid (n, n, g, 2)-SIGM-VC. is linear time invariant (LTI).
YAN et al.: IMPROVING THE VISUAL QUALITY OF SIZE-INVARIANT VC FOR GRAYSCALE IMAGES: AbS APPROACH 901
Fig. 12. Testing result of Yang’s algorithm [7], Wang’s algorithm [24], and
the AbS algorithm on the Kodak image database. (a) HPSNR, (b) MSSIM.
n
of the n share vectors is the target vector ŷ = si , where
i=1
a b denotes element-wise product between two vectors,
i.e., the Hadamard product. If the following two conditions
are satisfied, we call it a (n, n, m) Vector VC.
m
a) Contrast condition: Let B(y) = k=1 yi be the
brightness of the vector y, and y1 and y2 be two vectors such
that B (y1 ) < B(y2), then the
corresponding target vectors
should satisfy B ŷ1 ≤ B ŷ2 .
Fig. 13. The structure of AbS-based vector VC system.
b) Security condition: Let sd si1 , · · · , sid be any
d share vectors with d < n, then no information can be derived
the target image, then this produces a cluster of black pixels, from sd about y, i.e., Pr {y} = Pr {y | sd }.
and the feedback loop forces the quantizer to produce more Remark
2: The
contrast condition
only
requires that
white pixels. Hence we also see cluster of white pixels on B ŷ1 ≤ B ŷ2 , instead of B ŷ1 < B ŷ2 . The security
the target image. These clusters are the source of bad visual condition is the same as ordinary VC, which requires perfect
quality. To avoid the cluster of pixels on the target image, secrecy if given only d < n shares.
we should guarantee a certain amount of white pixels within Next, we give a construction of (n, n, m) vector VC that
a block on the target image. This can be accomplished by satisfies the above definition. Let E be the set of brightness
vector VC. So, in next section, we extend our AbS based of the vectors in E: E {B (y) , ∀y ∈ E}. And let
D be the
probabilistic VC to AbS-based vector VC. set of brightness of the vectors in D: D B ŷ , ∀ŷ ∈ D .
The essence of designing the vector VC is the design of
IV. A B S-BASED V ECTOR VC a non-invertible mapping M from E to D. This mapping
As shown in section III, for probabilistic VC, the major is realized by using different basic matrices for different
quality degradation comes from the out-of-gamut pixels. This values in D. The basic matrices can be designed using
problem can be remedied by vector VC where each image Algorithm 2.
block of size B × B is encoded. Algorithm 2 is based on construction 2 in [1]. Let
ai be the -th row of the basic matrix Ai constructed using
A. Overall Structure this construction, then the brightnesses of nthe vectors
from
The overall block diagram of AbS-based vector VC is stacking
all
the rows should satisfy: B a
=1
0 = 0 and
shown in Fig. 13. After the gamut mapping G, the input B n=1 a1 = 1. Then, it is straightforward to show that
grayscale image x [n] is divided into non-overlapping blocks. B n=1 bi = i , where bi is the -th row of the basic
The pixels in each block are organized into a vector x [n]. The matrix Bi .
modified vector x̂ [n] is quantized by a vector quantizer QE , For example, taking m = 4 and D = {2, 1, 0}, we get
where E is the codebook of the vector quantizer. The quantized
1 0 1 0 1 0 1 0
vector y [n] ∈ E is encoded by vector VC. Then, the gen- B0 = B1 = ,
0 1 0 1 0 1 1 0
erated share vectors s1 [n] , · · · , sn [n] are superimposed to
1 0 1 0
synthesize the target image ŷ [n]. The discrepancy e [n] = B2 = . (18)
1 0 1 0
x̂ [n]− ŷ [n] is calculated and diffused to adjacent blocks, using
a vector error diffusion filter H [n]. For (3,3)-threshold and m = 4, we have
The design of gamut mapping G, the vector quan- ⎡ ⎤ ⎡ ⎤
1 1 0 0 1 1 0 0
tizer QE and the diffusion filter H [n] depends on the vector
B0 = ⎣ 1 0 1 0 ⎦, B1 = ⎣ 1 0 1 0 ⎦, (19)
VC encoder, so we describe it first.
0 1 1 0 1 0 0 1
1) Vector VC: The input into the vector VC is a binary
vector y [n] ∈ Zm×1 2 , where m = B 2 is the number of pixels but now D = {1, 0}. We will focus on (2, 2)-threshold vector
in a block, and Z2 {0, 1}. For simplicity, we drop the time VC in the following discussion.
index n for a moment and focus on one block/vector. Next Next we need to determine the mapping M : E → D.
we define the vector VC. Recall that E is the codebook of the Recall that E = {0, 1, · · · , m}. Using the basic matrices Bi
quantizer and hence is also the codebook of the VC encoder. from Algorithm 2, we have D = {0, · · · , |D| − 1}. To make
Besides, we defined D to be the codebook of the VC decoder, full use of the output range of brightness, let 0 → 0, m →
i.e., the set of vectors on the target image. In general D ⊂ E |D| − 1. The mapping of other elements should be evenly
due to the security condition. So the mapping E → D distributed in D and meet the following restriction: if x < y,
is inevitably a many-to-one mapping, which is similar to a then M (x) ≤ M (y). For example, for m = 4 and n = 2,
stochastic quantizer. However, considering that this loss of we can use the mapping as shown in Table I.
contrast can be compensated by error diffusion loop, and that It is not difficult to verify the contrast condition from the
the security condition should be faithfully fulfilled, we relax construction of the mapping M. Furthermore, the rows of
the contrast condition in the definition. Bi are indistinguishable after random column permutation,
Definition 2: A (n, n, m) vector VC encodes a vector y ∈ so from only one row, one cannot infer which Bi is used.
Zm×1
2 into n share vectors s1 , · · · , sn ∈ Zm×1
2 . The stacking Hence the security condition in Definition 2 is satisfied.
906 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 28, NO. 2, FEBRUARY 2019
Fig. 15. Vector error diffusion process. The shaded block is the current
block.
B. Experimental Result
1) Reference Algorithms: Three relevant algorithms are
implemented and compared with the proposed AbS-based
Vector VC. Here we briefly outline these algorithms.
The first algorithm is Hou’s block encoding algorithm [42], Fig. 16. The target images. Each column corresponds to one algorithm.
From left to right: Hou’s algorithm [42], Liu’s algorithm [8], AbS Vector
which was also summarized in [8]. This algorithm works on VC algorithm, and halftone result using error diffusion. Each row corresponds
halftone image. The image blocks are classified according to to one gray level. From top to bottom, g = 18 , 14 , 12 , 34 , 78 . The halftone
their blackness, i.e., the number of black pixels in it. So for a image of 12 g serves as a reference since the first two algorithms are applied
block with m pixels, one gets m + 1 types of blocks Di , i = to halftone image.
0, 1, · · · , m. Let B0 and B1 represent the basic matrices for
black and white pixels in the basic deterministic VC [1]. When due to the fact that for a type-i block with i black pixels,
encoding a type i block, the basic matrix B0 is utilized i times Hou’s algorithm uses B0 for the first i type-i blocks. This
and the basic matrix B1 is utilized m − i times. So in a ‘local’ deterministic rule maps the periodic patterns in the halftone
neighborhood of m blocks (same type), the contrast between image into the periodic patterns on the target image. Also
black and white is maintained. one may notice that, along the vertical directions, the dots
The second algorithm is Liu’s improvement to Hou’s algo- are clustered into a band, hence may introduce low frequency
rithm [8]. Liu’s algorithm uses the same halftoning, the same components on the spectrum and RAPSD. Second, from
block type and counter as in Hou’s algorithm, but the use the second column, we observe that the periodic patterns
of B0 and B1 is probabilistic. Each block has chance to be are broken since Liu’s algorithm allows each pixel to have
encoded by B0 or B1 , depending on the type of the block and chance to use B0 and B1 , in a probabilistic manner. Last,
the number of B0 that has already been used for that type of from the third column, we observe that the target image from
block. the proposed AbS vector VC algorithm produces much better
Chen et al. use the histogram to guide the local map- visual quality: minority dots are spread apart. This is due to
ping between the secret image block and the block on the the vector error diffusion loop in AbS vector VC which pushes
target image, which is later improved by Chen et al. [9], the error to high frequency band.
Lee et al. [18]. We call these algorithms the histogram directed The target image for g = 18 from AbS (the first row and third
mapping (HDM) algorithms. column in Fig. 16) contains slightly noticeable line artifacts at
2) Testing on Constant Images: First we explore the top portion. The reason is that, the AbS algorithm uses raster
1 1 1 3 7 of the algorithms on constant images g ∈
performance scanning order, starting from the top-left corner and ending
8 , 4 , 2 , 4 , 8 , and study the spatial and spectral properties. at the bottom-right corner. At the beginning of the scanning
The histogram directed mapping algorithms, i.e., Chen’s algo- (the top), when g is small, the vector quantizer produces blocks
rithm and Lee’s algorithm, need the histogram that cannot be with either no white pixel, or just one white pixel. According
provided by a constant image, so they are excluded from the to Table I, these two types of blocks are mapped to all-black
current experiments. We will test them on natural images later. blocks on the target image. This mapping has two effects. First,
The target images from Hou’s algorithm, Liu’s algorithm it delays the appearance of white pixels on the target image,
and the proposed AbS vector VC are shown in Fig. 16. when compared to pure halftone result in the last column of
First, from the first column, we observe the periodic patterns Fig. 16. Second, the error between the secret block and the
produced by Hou’s algorithms. Moreover, when there are target block will be accumulated till it is large enough such
periodic patterns on the halftone image (see last column), that the vector quanziter produces at least two white pixels in
there will be periodic patterns on the target image. This is the 2 × 2 block. When that happens, the target block contains
908 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 28, NO. 2, FEBRUARY 2019
Fig. 18. Residual variance for Hou and Tu [42] 2004, Liu et al. [8] 2012,
AbS and Halftone. (a) Average gray level of the target image after Gaussian
smoothing. The results for Hou 2004 and Liu 2012 are overlapped by the
result of AbS. (b) Residual variance.
Fig. 17. RAPSDs for the images in Fig. 16. From top to bottom,
g = 18 , 14 , 12 , 34 , 78 . The RAPSD for the halftone image of 12 g from error
diffusion is plotted as blue dashed curve in each sub-figure. The symbol
indicates the blue noise principal frequency. (a) Hou and Tu [42] 2004.
(b) Liu et al. [8] 2012. (c) AbS.
image. These clusters lead to the large residual variance measure, the residual variance, is also designed to further
and large RAPSD at low radial frequencies. characterize the level of noise relevant to the HVS.
• For AbS-based vector VC, such as the one using the The AbS framework can successfully push the noise on
mapping in Table I, we can guarantee the number of black the target image to high frequency bands. Among the two
pixels on the target image, depending on the number of AbS algorithms, the AbS vector VC produces almost zero
white pixels on the secret image. For example, if the DC component on RAPSD. Its residual variance is also
secret image block has 4 white pixels, i.e., B(y) = 4, the lowest amongst the competing algorithms. In terms of
then after VC encoding and stacking, there are only two the fidelity of the target image, the vector VC consistently
black pixels on the target block, i.e. B(ŷ) = 2 (See the outperforms the existing algorithms.
first row of Table I). The probability of seeing four black One limitation of the current work is that it is limited to
pixels in this small block is zero on target image. Thus, error diffusion framework. Possible future works include the
we can be sure that on a local 2 × 2 block, the input gray elaboration of a DBS-like algorithm to solve the optimiza-
level (after gamut mapping) is within the output gamut. tion problem in (4) directly. For the ordered dithering based
So, the black pixels are more evenly distributed, thus pro- halftoning algorithm, if the dither pattern is made adaptive
ducing more stable residual variance across different gray to the stacking results from neighboring blocks, then it may
levels, and producing near zero RAPSD for low radial possible to design AbS based VC for ordered dithering.
frequencies.
Second, Hou’s algorithm and Liu’s algorithm produce sim- ACKNOWLEDGEMENT
ilar results. Third, Lee’s algorithm produces better MSSIM We would like to thank the editor and the anonymous
than Hou’s algorithm and Liu’s algorithm, but worse HPSNR. reviewers for their valuable suggestions and comments.
This is due to the implicit equalization in Lee’s algorithm
which affects the intensity of the target image. Since HPSNR R EFERENCES
measures tone similarity, any change of intensity may decrease
[1] M. Naor and A. Shamir, “Visual cryptography,” in Proc. Work-
HPSNR. On the contrary, MSSIM also reflects the correlation shop Theory Appl. Cryptograph. Techn. (EUROCRYPT), Perugia, Italy,
between the reference image and the target image, hence is less May 1994, pp. 1–12.
affected by equalization. We also include HPSNR and MSSIM [2] E. Myodo, K. Takagi, S. Miyaji, and Y. Takishima, “Halftone visual
cryptography embedding a natural grayscale image based on error
between the reference image and its halftone image. Since diffusion technique,” in Proc. IEEE Int. Conf. Multimedia Expo, Beijing,
there is no modification due to VC encoding and stacking, each China, Jul. 2007, pp. 2114–2117.
secret block is perfectly reconstructed on the halftone image. [3] O. Kafri and E. Keren, “Encryption of pictures and shapes by random
grids,” Opt. Lett., vol. 12, no. 6, pp. 377–379, Jun. 1987.
This result serves as an upper bound for all VC algorithms [4] S. J. Shyu, “Image encryption by random grids,” Pattern Recognit.,
based on the same halftoning method. One may observe that, vol. 40, no. 3, pp. 1014–1031, Mar. 2007.
for images with complicated contents, such as images No. 5, [5] R. De Prisco and A. De Santis, “On the relation of random grid and
deterministic visual cryptography,” IEEE Trans. Inf. Forensics Security,
No. 8 and No. 13, the HPSNRs produced by AbS are very vol. 9, no. 4, pp. 653–665, Apr. 2014.
close to those from the halftone images. [6] R. Ito, H. Kuwakado, and H. Tanaka, “Image size invariant visual cryp-
Finally, we note that, all of the four algorithms involved tography,” IEICE Trans. Fundam., vol. E82-A, no. 10, pp. 2172–2177,
Oct. 1999.
in this section have linear complexity O(M N). When AbS is [7] C.-N. Yang, “New visual secret sharing schemes using probabilistic
compared to Lee’s algorithm (the closely relevant one to AbS), method,” Pattern Recognit. Lett., vol. 25, no. 4, pp. 481–494, 2004.
the block error diffusion in AbS has the same complexity as [8] F. Liu, T. Guo, C. Wu, and L. Qian, “Improving the visual quality
of size invariant visual cryptography scheme,” J. Vis. Commun. Image
the pixel-based error diffusion in Lee’s algorithm. The AbS Represent., vol. 23, no. 2, pp. 331–342, Feb. 2012.
algorithm needs gamut mapping and simulated stacking for [9] Y.-F. Chen, Y.-K. Chan, C.-C. Huang, M.-H. Tsai, and Y.-P. Chu,
each block. So, totally 2M N more multiplications are needed “A multiple-level visual secret-sharing scheme without image size
expansion,” Inf. Sci., vol. 177, no. 21, pp. 4696–4710, Nov. 2007.
for AbS. Since this is linear in M N, it results only slight [10] Z. Wang, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptog-
increase in time complexity. On the Lena image, the machine raphy via error diffusion,” IEEE Trans. Inf. Forensics Security, vol. 4,
time for Lee’s algorithm is 4.54 seconds, and the machine time no. 3, pp. 383–396, Sep. 2009.
[11] F. Liu and C. Wu, “Embedded extended visual cryptography schemes,”
for AbS is 5.41 seconds. IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 307–322,
Jun. 2011.
V. C ONCLUSION [12] X. Wu and W. Sun, “Generalized random grid and its applications in
visual cryptography,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 9,
Aiming at improving the visual quality of the recon- pp. 1541–1553, Sep. 2013.
structed secret image (i.e., target image) in size-invariant visual [13] X. Wu and W. Sun, “Extended capabilities for XOR-based visual
cryptography, we propose an AbS framework to push the cryptography,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 10,
pp. 1592–1605, Oct. 2014.
reconstruction error to high-frequency band. This framework [14] Y.-C. Hou and S.-F. Tu, “A visual cryptographic technique for chromatic
is flexible in that it can be used in any (n, n)-threshold images using multi-pixel encoding method,” J. Res. Pract. Inf. Technol.,
VC algorithm to improve the visual quality, without sac- vol. 37, no. 2, pp. 179–191, May 2005.
[15] S. F. Tu and Y. C. Hou, “Design of visual cryptographic methods with
rificing security. Based on the AbS framework, two algo- smoothlooking decoded images of invariant size for grey-level images,”
rithms are designed, including AbS-based probabilistic VC and Imag. Sci. J., vol. 55, no. 2, pp. 90–101, Jun. 2007.
AbS-based vector VC. We introduce the measure RAPSD that [16] Y.-W. Chow, W. Susilo, and D. S. Wong, “Enhancing the perceived
visual quality of a size invariant visual cryptography scheme,” in Proc.
is traditionally used for evaluating the quality of halftone 14th Int. Conf. Inf. Commun. Secur. (ICICS), Hong Kong, Oct. 2012,
image to characterize the quality of target image. A new pp. 10–21.
YAN et al.: IMPROVING THE VISUAL QUALITY OF SIZE-INVARIANT VC FOR GRAYSCALE IMAGES: AbS APPROACH 911
[17] X. Wu and W. Sun, “Improving the visual quality of random grid-based [39] X. Wu, T. Liu, and W. Sun, “Improving the visual quality of random
visual secret sharing,” Signal Process., vol. 93, no. 5, pp. 977–995, grid-based visual secret sharing via error diffusion,” J. Vis. Commun.
May 2013. Image Represent., vol. 24, no. 5, pp. 552–566, 2013.
[18] C.-C. Lee, H.-H. Chen, H.-T. Liu, G.-W. Chen, and C.-S. Tsai, “A new [40] A. Gersho and R. M. Gray, Vector Quantization and Signal Compression.
visual cryptography with multi-level encoding,” J. Vis. Lang. Comput., Norwell, MA, USA: Kluwer, 1991.
vol. 25, no. 3, pp. 243–250, Jun. 2014. [41] N. Damera-Venkata and B. L. Evans, “FM halftoning via block error
[19] H.-H. Chen, C.-C. Lee, C.-C. Lee, H.-C. Wu, and C.-S. Tsai, “Multi- diffusion,” in Proc. Int. Conf. Image Process., Thessaloniki, Greece,
level visual secret sharing scheme with smooth-looking,” in Proc. vol. 2, Oct. 2001, pp. 1081–1084.
2nd Int. Conf. Interact. Sci. (ICIS), Seoul, South Korea, Nov. 2009, [42] Y. C. Hou and S. F. Tu, “Visual cryptography techniques for color images
pp. 155–160. without pixel expansion,” (in Chinese), J. Inf., Technol. Soc., vol. 4,
[20] J.-M. Guo, J.-Y. Chang, Y.-F. Liu, G.-H. Lai, and J.-D. Lee, “Tone- no. 1, pp. 95–110, 2004.
replacement error diffusion for multitoning,” IEEE Trans. Image
Process., vol. 24, no. 11, pp. 4312–4321, Nov. 2015.
[21] C.-N. Yang, C.-C. Wu, and D.-S. Wang, “A discussion on the relationship
between probabilistic visual cryptography and random grid,” Inf. Sci.,
vol. 278, pp. 141–173, Sep. 2014. Bin Yan (M’15) received the Ph.D. degree in
electrical engineering from the Harbin Institute of
[22] D. Lau and G. Arce, Modern Digital Halftoning, 2nd ed. Boca Raton,
FL, USA: Taylor & Francis, 2001. Technology, China, in 2007. From 1996 to 1999, he
[23] C. W. Wu, G. R. Thompson, and M. J. Stanich, “Digital watermark- was an Engineer with the Goma Company Group.
ing and steganography via overlays of halftone images,” Proc. SPIE, From 2007 to 2012, he was a Lecturer with the
Shandong University of Science and Technology.
vol. 5561, pp. 152–164, Oct. 2004.
[24] D. S. Wang, F. Yi, and X. B. Li, “Probabilistic visual secret sharing From 2015 to 2016, he was a Visiting Scholar with
schemes for grey-scale images and color images,” Inf. Sci., vol. 181, Deakin University, Australia. Since 2013, he has
no. 11, pp. 2189–2208, 2011. been an Associate Professor with the College of
[25] R. Escbbach, Z. Fan, K. T. Knox, and G. Marcu, “Threshold modulation Electronics, Communication and Physics, Shandong
and stability in error diffusion,” IEEE Signal Process. Mag., vol. 20, University of Science and Technology. His research
no. 4, pp. 39–50, Jul. 2003. interests include multimedia signal processing, multimedia security, statistical
signal processing, and data forensic.
[26] R. W. Floyd and L. Steinberg, “An adaptive algorithm for spatial gray-
scale,” Proc. Soc. Inf. Display, vol. 17, no. 2, pp. 75–77, 1976.
[27] J. F. Jarvis, C. N. Judice, and W. Ninke, “A survey of techniques for
the display of continuous tone pictures on bilevel displays,” Comput.
Graph. Image Process., vol. 5, no. 1, pp. 13–40, 1976. Yong Xiang (SM’12) received the Ph.D. degree
[28] P. Stucki, “MECCA—A multiple-error correcting computation algorithm in electrical and electronic engineering from The
for bilevel image hardcopy reproduction,” IBM Res. Lab., Zurich, University of Melbourne, Australia. He is currently
Switzerland, Tech. Rep. RZ 1060, 1981. a Professor and the Director of the Artificial Intel-
[29] C. E. Shannon, “Communication theory of secrecy systems,” Bell Labs ligence and Image Processing Research Cluster,
Tech. J., vol. 28, no. 4, pp. 656–715, Oct. 1949. School of Information Technology, Deakin Univer-
[30] T. D. Kite, B. L. Evans, A. C. Bovik, and T. L. Sculley, “Digital sity, Australia. He has published four monographs,
halftoning as 2-D delta-sigma modulation,” in Proc. Int. Conf. Image over 100 refereed journal articles, and numerous
Process., vol. 1, Oct. 1997, pp. 799–802. conference papers in these areas. His research inter-
[31] T. D. Kite, B. L. Evans, and A. C. Bovik, “Modeling and quality assess- ests include information security and privacy, signal
ment of halftoning by error diffusion,” IEEE Trans. Image Process., and image processing, data analytics and machine
vol. 9, no. 5, pp. 909–922, May 2000. intelligence, Internet of Things, and blockchain. He has served as a program
[32] R. A. Ulichney, “Dithering with blue noise,” Proc. IEEE, vol. 76, no. 1, chair, a TPC chair, a symposium chair, and a session chair for a number
pp. 56–79, Jan. 1988. of international conferences. He is an Associate Editor of the IEEE S IGNAL
[33] P. L. Callet, F. Autrusseau, and P. Campisi, “Visibility control and P ROCESSING L ETTERS and the IEEE A CCESS .
quality assessment of watermarking and data hiding algorithms,” in Mul-
timedia Forensics and Security. Hershey, PA, USA: IGI Global, 2008,
pp. 164–192.
[34] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image
quality assessment: From error visibility to structural similarity,” IEEE Guang Hua (S’12–M’13) received the B.Eng.
Trans. Image Process., vol. 13, no. 4, pp. 600–612, Apr. 2004. degree in communication engineering from Wuhan
[35] B. Yan, Y.-F. Wang, L.-Y. Song, and H.-M. Yang, “Size-invariant University, China, in 2009, and the M.Sc. degree in
extended visual cryptography with embedded watermark based on error signal processing and the Ph.D. degree in informa-
diffusion,” Multimedia Tools Appl., vol. 75, no. 18, pp. 11157–11180, tion engineering from Nanyang Technological Uni-
2015. versity, Singapore, in 2010 and 2014, respectively.
[36] X. Yan, S. Wang, X. Niu, and C.-N. Yang, “Halftone visual cryptography From 2013 to 2015, he was a Research Scientist with
with minimum auxiliary black pixels and uniform image quality,” Digit. the Department of Cyber Security and Intelligence,
Signal Process., vol. 38, pp. 53–65, Mar. 2015. Institute for Infocomm Research, Singapore. After
[37] Y.-C. Hou, S.-C. Wei, and C.-Y. Lin, “Random-grid-based visual cryp- that, he joined the School of Electrical and Elec-
tography schemes,” IEEE Trans. Circuits Syst. Video Technol., vol. 24, tronic Engineering, Nanyang Technological Univer-
no. 5, pp. 733–744, May 2014. sity, as a Research Fellow, until 2017. He is currently with the School of
[38] Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptog- Electronic Information, Wuhan University. His research interests include mul-
raphy,” IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453, timedia forensics and security, applied convex optimization, applied machine
Aug. 2006. learning, and general signal processing topics.