Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints

Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to addr...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on image processing Vol. 22; no. 10; pp. 3830 - 3841
Main Authors Lee, Kai-Hui, Chiu, Pei-Ling
Format Journal Article
LanguageEnglish
Published New York, NY IEEE 01.10.2013
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1057-7149
1941-0042
1941-0042
DOI10.1109/TIP.2013.2262290

Cover

Loading…
Abstract Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to address these issues without sophisticated codebook design. This approach can be used for binary secret images in non-computer-aided decryption environments. To avoid pixel expansion, we design a set of column vectors to encrypt secret pixels rather than using the conventional VC-based approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulated-annealing-based algorithm to solve the problem. The experimental results show that the display quality of the recovered image is superior to that of previous papers.
AbstractList Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to address these issues without sophisticated codebook design. This approach can be used for binary secret images in non-computer-aided decryption environments. To avoid pixel expansion, we design a set of column vectors to encrypt secret pixels rather than using the conventional VC-based approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulated-annealing-based algorithm to solve the problem. The experimental results show that the display quality of the recovered image is superior to that of previous papers.
Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to address these issues without sophisticated codebook design. This approach can be used for binary secret images in non-computer-aided decryption environments. To avoid pixel expansion, we design a set of column vectors to encrypt secret pixels rather than using the conventional VC-based approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulated-annealing-based algorithm to solve the problem. The experimental results show that the display quality of the recovered image is superior to that of previous papers.Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to address these issues without sophisticated codebook design. This approach can be used for binary secret images in non-computer-aided decryption environments. To avoid pixel expansion, we design a set of column vectors to encrypt secret pixels rather than using the conventional VC-based approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulated-annealing-based algorithm to solve the problem. The experimental results show that the display quality of the recovered image is superior to that of previous papers.
Author Chiu, Pei-Ling
Lee, Kai-Hui
Author_xml – sequence: 1
  givenname: Kai-Hui
  surname: Lee
  fullname: Lee, Kai-Hui
  email: khlee@mail.mcu.edu.tw
  organization: Department of Computer Science and Information Engineering, Ming Chuan University, Taoyuan, Taiwan
– sequence: 2
  givenname: Pei-Ling
  surname: Chiu
  fullname: Chiu, Pei-Ling
  email: plchiu@mail.mcu.edu.tw
  organization: Department of Risk Management and Insurance, Ming Chuan University, Taipei, Taiwan
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27783996$$DView record in Pascal Francis
https://www.ncbi.nlm.nih.gov/pubmed/23674454$$D View this record in MEDLINE/PubMed
BookMark eNqNkt1rFDEUxYNUbLv6LggSEMGXWfM1H3ksa60LBZVWX4c7mTs1y0xmTDLC9K83y64V-iBCIBfyO-fm5uScnLjRISEvOVtzzvT72-2XtWBcroUohNDsCTnjWvGMMSVOUs3yMiu50qfkPIQdY1zlvHhGToUsSqVydUaG7QB3SG_sPdKt-wXegov0uw0z9HTjlymOdx6mHwvtRk-v0KFPBxfGYAj0JvrZxNljKudmhybSONIPNkw9LPRrsrBxoZvRhejBuhiek6cd9AFfHPcV-fbx8nbzKbv-fLXdXFxnRnEWs04yZUQFgLkSRddKaHSLHHXT8LytZKfT8IXQpdBV0zYIpckRDFeKVV0HUq7Iu4Pv5MefM4ZYDzYY7HtwOM6h5komcVGV1X-gQhdSq0ok9M0jdDfO3qVBElVynVZCV-T1kZqbAdt68nYAv9R_3jwBb48ABAN958EZG_5yZbrVwYgdOOPHEDx2Dwhn9T7-OsVf7-Ovj_EnSfFIYmyEaEe3D6D_l_DVQWgR8aFPkae_w3P5GyhHu7w
CODEN IIPRE4
CitedBy_id crossref_primary_10_1016_j_cose_2014_10_001
crossref_primary_10_1016_j_jisa_2017_04_004
crossref_primary_10_1016_j_measurement_2019_02_069
crossref_primary_10_1007_s11042_023_17416_0
crossref_primary_10_1186_s13635_016_0053_0
crossref_primary_10_1007_s11042_021_11229_9
crossref_primary_10_1016_j_jvlc_2013_11_001
crossref_primary_10_1109_TIFS_2013_2292509
crossref_primary_10_1007_s11277_021_08630_w
crossref_primary_10_1016_j_irbm_2020_07_003
crossref_primary_10_1109_TIP_2017_2738561
crossref_primary_10_1142_S0219467823500596
Cites_doi 10.1109/TIFS.2011.2157144
10.1109/TIFS.2009.2037660
10.1016/j.ipl.2010.01.003
10.1007/978-3-642-34129-8_2
10.1016/j.patrec.2003.12.011
10.1016/S0304-3975(99)00243-1
10.1007/11875604_8
10.1109/TIFS.2011.2167611
10.4304/jcp.3.12.68-75
10.1007/978-3-642-14298-7_5
10.1016/S0097-8493(98)00034-X
10.1117/1.2353204
10.1006/inco.1996.0076
ContentType Journal Article
Copyright 2014 INIST-CNRS
Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Oct 2013
Copyright_xml – notice: 2014 INIST-CNRS
– notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Oct 2013
DBID 97E
RIA
RIE
AAYXX
CITATION
IQODW
NPM
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
7X8
F28
FR3
DOI 10.1109/TIP.2013.2262290
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Pascal-Francis
PubMed
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
MEDLINE - Academic
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
PubMed
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
MEDLINE - Academic
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList
PubMed
Technology Research Database
Technology Research Database
MEDLINE - Academic
Database_xml – sequence: 1
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
Engineering
EISSN 1941-0042
EndPage 3841
ExternalDocumentID 3169623251
23674454
27783996
10_1109_TIP_2013_2262290
6514915
Genre orig-research
Research Support, Non-U.S. Gov't
Journal Article
GroupedDBID ---
-~X
.DC
0R~
29I
4.4
53G
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
F5P
HZ~
H~9
ICLAB
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
RIA
RIE
RNS
TAE
TN5
VH1
AAYOK
AAYXX
CITATION
RIG
IQODW
NPM
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
7X8
F28
FR3
ID FETCH-LOGICAL-c410t-f304c28aae5426fd3ab9de1e9bb15d83f91096297298bdbea7c5eac14408ffa33
IEDL.DBID RIE
ISSN 1057-7149
1941-0042
IngestDate Fri Jul 11 06:36:57 EDT 2025
Fri Jul 11 10:03:00 EDT 2025
Mon Jun 30 10:19:04 EDT 2025
Thu Apr 03 07:06:24 EDT 2025
Wed Apr 02 07:49:46 EDT 2025
Sun Jul 06 05:04:59 EDT 2025
Thu Apr 24 23:02:24 EDT 2025
Wed Aug 27 02:03:32 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 10
Keywords Encryption
Decryption
Optimization
Image quality
general access structures
Visual secret sharing scheme
Codebook
pixel expansion
Simulated annealing
Security of data
controllable display quality
Binary image
Secret sharing
Cryptography
Computer aid
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
CC BY 4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c410t-f304c28aae5426fd3ab9de1e9bb15d83f91096297298bdbea7c5eac14408ffa33
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ObjectType-Article-2
ObjectType-Feature-1
PMID 23674454
PQID 1471971996
PQPubID 85429
PageCount 12
ParticipantIDs pubmed_primary_23674454
crossref_citationtrail_10_1109_TIP_2013_2262290
proquest_journals_1471971996
ieee_primary_6514915
pascalfrancis_primary_27783996
crossref_primary_10_1109_TIP_2013_2262290
proquest_miscellaneous_1439726878
proquest_miscellaneous_1429639482
PublicationCentury 2000
PublicationDate 2013-10-01
PublicationDateYYYYMMDD 2013-10-01
PublicationDate_xml – month: 10
  year: 2013
  text: 2013-10-01
  day: 01
PublicationDecade 2010
PublicationPlace New York, NY
PublicationPlace_xml – name: New York, NY
– name: United States
– name: New York
PublicationTitle IEEE transactions on image processing
PublicationTitleAbbrev TIP
PublicationTitleAlternate IEEE Trans Image Process
PublicationYear 2013
Publisher IEEE
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: Institute of Electrical and Electronics Engineers
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
adhikari (ref10) 2004; 3348
ref15
ref14
koga (ref16) 2002
ref2
hsu (ref8) 2006; 4203
ref17
ref18
ref7
ito (ref4) 1999; e82 a
ref3
liu (ref9) 2010; 5
ref6
macpherson (ref11) 2002
ref5
naor (ref1) 1995; 950
References_xml – ident: ref5
  doi: 10.1109/TIFS.2011.2157144
– volume: 5
  start-page: 27
  year: 2010
  ident: ref9
  article-title: Step construction of visual cryptography schemes
  publication-title: IEEE Trans Inf Forensics Security
  doi: 10.1109/TIFS.2009.2037660
– ident: ref13
  doi: 10.1016/j.ipl.2010.01.003
– ident: ref17
  doi: 10.1007/978-3-642-34129-8_2
– ident: ref3
  doi: 10.1016/j.patrec.2003.12.011
– volume: 3348
  start-page: 399
  year: 2004
  ident: ref10
  publication-title: Progress in Cryptology (LNCS)
– volume: e82 a
  start-page: 2172
  year: 1999
  ident: ref4
  article-title: Image size invariant visual cryptography
  publication-title: IEICE Trans Fundam
– year: 2002
  ident: ref11
  publication-title: Grey Level Visual Cryptography for General Access Structures
– ident: ref15
  doi: 10.1016/S0304-3975(99)00243-1
– volume: 950
  start-page: 1
  year: 1995
  ident: ref1
  publication-title: Advances in Cryptology
– volume: 4203
  start-page: 58
  year: 2006
  ident: ref8
  publication-title: Foundations of Intelligent Systems (LNAI)
  doi: 10.1007/11875604_8
– ident: ref12
  doi: 10.1109/TIFS.2011.2167611
– start-page: 328
  year: 2002
  ident: ref16
  publication-title: Advances in Cryptology ? ASIACRYPT?98
– ident: ref18
  doi: 10.4304/jcp.3.12.68-75
– ident: ref2
  doi: 10.1007/978-3-642-14298-7_5
– ident: ref14
  doi: 10.1016/S0097-8493(98)00034-X
– ident: ref7
  doi: 10.1117/1.2353204
– ident: ref6
  doi: 10.1006/inco.1996.0076
SSID ssj0014516
Score 2.2498252
Snippet Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a...
SourceID proquest
pubmed
pascalfrancis
crossref
ieee
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 3830
SubjectTerms Algorithms
Applied sciences
Construction
controllable display quality
Cryptography
Design engineering
Detection, estimation, filtering, equalization, prediction
Exact sciences and technology
general access structures
Image processing
Image quality
Information, signal and communications theory
Maintenance
Mathematical analysis
Mathematical models
Optimization
pixel expansion
Pixels
Signal and communications theory
Signal processing
Signal, noise
Systematics
Telecommunications and information theory
Vectors
Vectors (mathematics)
Visual
Visual secret sharing scheme
Visualization
Title Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints
URI https://ieeexplore.ieee.org/document/6514915
https://www.ncbi.nlm.nih.gov/pubmed/23674454
https://www.proquest.com/docview/1471971996
https://www.proquest.com/docview/1429639482
https://www.proquest.com/docview/1439726878
Volume 22
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT9wwEB1RTu2htNCPtBS5Ui-Vmt0kdmL7iCiIrURVCai4RXbsSCsgu2qSSsuv79jxpqUCxC2KZyNnZzx-kxm_AfgkUgSxPOGxUTSLGacy1jKpY82ZyqjJK67dAeeT78XxOft2kV9swJfxLIy11hef2Ym79Ll8s6h696lsWuDuLt2J8icYuA1ntcaMgWs46zObOY85iq1Tkomcns1-uBouOkGo4ejNHQEwLThjObu1G_n2Kq44UrX4_9RDY4v7kaffgY624GQ996Hw5HLSd3pS3fxH6_jYl3sBzwMUJfuD7byEDdtsw1aApSQs-nYbnv3DWbgD17NrdEHkdH5jyaz5jaE26ob8nLc9Puvg12rZBRJsgnCYBFZrsu_7MpJTz1bbY4hP0GO5T0CkW5Cv83Z5pVZk4PNYEddE1Leu6NpXcH50eHZwHIeeDXHF0qSLa5qwKhNK2Rz3_tpQpaWxqZVap7kRtEZ4IotMIqYX2mireJWj73cpZlHXitLXsNksGvsWiEbvk-IzENFYZrJCSVPlKJyIqkjxbgTTte7KKhCau8ldlT6wSWSJii-d4sug-Ag-j79YDmQeD8juOB2NckE9EezdMo9xPOMcsaYsIthd20sZ3EGL8RVPJU_98MdxGBeyy86oxi56J5OhM5RMZA_JIHzMCsFFBG8GW_w7gWDS7-6e-Ht46l5vqEPchU3Ut_2AeKrTe34h_QEdxRo1
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Rb9MwED5N4wF4YLDBCIxhJF6QSJvETmw_ToOphXVCWof2FtmJI1VsaUUSpO7Xc3bcwBBMvEXxNXJ65_Pn3N13AG9FjCCWRzwsFU1CxqkMtYyqUHOmElqmBde2wHl2lk0u2KfL9HIL3g-1MMYYl3xmRvbSxfLLZdHZT2XjDHd3aSvK76W2GLev1hpiBrblrIttpjzkKLgJSkZyPJ9-sVlcdIRgwxKcWwpgmnHGUnZrP3INVmx6pGrwH6r61hb_xp5uDzrZgdlm9n3qybdR1-pRcfMHseP_vt5jeOTBKDnqrecJbJl6F3Y8MCV-2Te78PA31sI9uJ5eoxMi54sbQ6b1Dzxso3bI10XT4bOOv69XrafBJgiIiee1JkeuMyM5d3y1HR7yCfos-xGItEvyYdGsrtSa9Iwea2LbiLrmFW3zFC5OPs6PJ6Hv2hAWLI7asKIRKxKhlElx969KqrQsTWyk1nFaClohQJFZIhHVC11qo3iRove3QWZRVYrSZ7BdL2vzHIhG_xPjMxDTGFYmmZJlkaJwJIosxrsBjDe6ywtPaW4nd5W7o00kc1R8bhWfe8UH8G74xaqn87hDds_qaJDz6gng8JZ5DOMJ54g2ZRbAwcZecu8QGjxh8Vjy2A2_GYZxKdv4jKrNsrMyCbpDyURylwwCyCQTXASw39virwl4k37x94m_hvuT-ew0P52efX4JD-yr9lmJB7CNujevEF21-tAtqp_uCh19
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+Size+Invariant+Visual+Cryptography+for+General+Access+Structures+Subject+to+Display+Quality+Constraints&rft.jtitle=IEEE+transactions+on+image+processing&rft.au=Lee%2C+Kai-Hui&rft.au=Chiu%2C+Pei-Ling&rft.date=2013-10-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1057-7149&rft.eissn=1941-0042&rft.volume=22&rft.issue=10&rft.spage=3830&rft_id=info:doi/10.1109%2FTIP.2013.2262290&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=3169623251
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1057-7149&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1057-7149&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1057-7149&client=summon