CRP2-VCS: Contrast-Oriented Region-Based Progressive Probabilistic Visual Cryptography Schemes
Most visual cryptography schemes (VCSs) are condition-oriented which implies their designs focus on satisfying the contrast and security conditions in VCS. In this paper, we explore a new architecture of VCS: contrast-oriented region-based progressive probabilistic VCS (CRP2-VCS). The term contrast-...
Saved in:
Published in | IEEE transactions on circuits and systems for video technology Vol. 35; no. 6; pp. 5501 - 5517 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.06.2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Most visual cryptography schemes (VCSs) are condition-oriented which implies their designs focus on satisfying the contrast and security conditions in VCS. In this paper, we explore a new architecture of VCS: contrast-oriented region-based progressive probabilistic VCS (CRP2-VCS). The term contrast-oriented indicates the optimality of multi-contrast is taken into consideration when producing shadows. First of all, new requirements for CRP2-VCS, described by probabilities, are introduced. As a non-interference requirement is proposed, the secret interference problem in existing region-based progressive VCS can be avoided. Then, a construction of CRP2-VCS based on a multi-contrast-maximizing model is provided. The multi-contrast-maximizing problem is essentially a probabilistic VCS model that fuses region-based sharing, multi-contrast optimization, and general access structure (GAS) together. Finally, a Max-Min based technique is adopted to solve the multi-objective optimization problem. Moreover, to further boost the visual quality, the proposed method is extended to allow employing XOR operation for image recovery. Experimental results and comparisons are demonstrated to show the effectiveness and advantages, such as optimal visual quality, non-expansible shadow and GAS sharing policy, are provided by the proposed technique. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 1051-8215 1558-2205 |
DOI: | 10.1109/TCSVT.2025.3532454 |