Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints
Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to addr...
Saved in:
Published in | IEEE transactions on image processing Vol. 22; no. 10; pp. 3830 - 3841 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York, NY
IEEE
01.10.2013
Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1057-7149 1941-0042 1941-0042 |
DOI | 10.1109/TIP.2013.2262290 |
Cover
Loading…
Abstract | Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to address these issues without sophisticated codebook design. This approach can be used for binary secret images in non-computer-aided decryption environments. To avoid pixel expansion, we design a set of column vectors to encrypt secret pixels rather than using the conventional VC-based approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulated-annealing-based algorithm to solve the problem. The experimental results show that the display quality of the recovered image is superior to that of previous papers. |
---|---|
AbstractList | Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to address these issues without sophisticated codebook design. This approach can be used for binary secret images in non-computer-aided decryption environments. To avoid pixel expansion, we design a set of column vectors to encrypt secret pixels rather than using the conventional VC-based approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulated-annealing-based algorithm to solve the problem. The experimental results show that the display quality of the recovered image is superior to that of previous papers. Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to address these issues without sophisticated codebook design. This approach can be used for binary secret images in non-computer-aided decryption environments. To avoid pixel expansion, we design a set of column vectors to encrypt secret pixels rather than using the conventional VC-based approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulated-annealing-based algorithm to solve the problem. The experimental results show that the display quality of the recovered image is superior to that of previous papers.Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to address these issues without sophisticated codebook design. This approach can be used for binary secret images in non-computer-aided decryption environments. To avoid pixel expansion, we design a set of column vectors to encrypt secret pixels rather than using the conventional VC-based approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulated-annealing-based algorithm to solve the problem. The experimental results show that the display quality of the recovered image is superior to that of previous papers. |
Author | Chiu, Pei-Ling Lee, Kai-Hui |
Author_xml | – sequence: 1 givenname: Kai-Hui surname: Lee fullname: Lee, Kai-Hui email: khlee@mail.mcu.edu.tw organization: Department of Computer Science and Information Engineering, Ming Chuan University, Taoyuan, Taiwan – sequence: 2 givenname: Pei-Ling surname: Chiu fullname: Chiu, Pei-Ling email: plchiu@mail.mcu.edu.tw organization: Department of Risk Management and Insurance, Ming Chuan University, Taipei, Taiwan |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27783996$$DView record in Pascal Francis https://www.ncbi.nlm.nih.gov/pubmed/23674454$$D View this record in MEDLINE/PubMed |
BookMark | eNqNkt1rFDEUxYNUbLv6LggSEMGXWfM1H3ksa60LBZVWX4c7mTs1y0xmTDLC9K83y64V-iBCIBfyO-fm5uScnLjRISEvOVtzzvT72-2XtWBcroUohNDsCTnjWvGMMSVOUs3yMiu50qfkPIQdY1zlvHhGToUsSqVydUaG7QB3SG_sPdKt-wXegov0uw0z9HTjlymOdx6mHwvtRk-v0KFPBxfGYAj0JvrZxNljKudmhybSONIPNkw9LPRrsrBxoZvRhejBuhiek6cd9AFfHPcV-fbx8nbzKbv-fLXdXFxnRnEWs04yZUQFgLkSRddKaHSLHHXT8LytZKfT8IXQpdBV0zYIpckRDFeKVV0HUq7Iu4Pv5MefM4ZYDzYY7HtwOM6h5komcVGV1X-gQhdSq0ok9M0jdDfO3qVBElVynVZCV-T1kZqbAdt68nYAv9R_3jwBb48ABAN958EZG_5yZbrVwYgdOOPHEDx2Dwhn9T7-OsVf7-Ovj_EnSfFIYmyEaEe3D6D_l_DVQWgR8aFPkae_w3P5GyhHu7w |
CODEN | IIPRE4 |
CitedBy_id | crossref_primary_10_1016_j_cose_2014_10_001 crossref_primary_10_1016_j_jisa_2017_04_004 crossref_primary_10_1016_j_measurement_2019_02_069 crossref_primary_10_1007_s11042_023_17416_0 crossref_primary_10_1186_s13635_016_0053_0 crossref_primary_10_1007_s11042_021_11229_9 crossref_primary_10_1016_j_jvlc_2013_11_001 crossref_primary_10_1109_TIFS_2013_2292509 crossref_primary_10_1007_s11277_021_08630_w crossref_primary_10_1016_j_irbm_2020_07_003 crossref_primary_10_1109_TIP_2017_2738561 crossref_primary_10_1142_S0219467823500596 |
Cites_doi | 10.1109/TIFS.2011.2157144 10.1109/TIFS.2009.2037660 10.1016/j.ipl.2010.01.003 10.1007/978-3-642-34129-8_2 10.1016/j.patrec.2003.12.011 10.1016/S0304-3975(99)00243-1 10.1007/11875604_8 10.1109/TIFS.2011.2167611 10.4304/jcp.3.12.68-75 10.1007/978-3-642-14298-7_5 10.1016/S0097-8493(98)00034-X 10.1117/1.2353204 10.1006/inco.1996.0076 |
ContentType | Journal Article |
Copyright | 2014 INIST-CNRS Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Oct 2013 |
Copyright_xml | – notice: 2014 INIST-CNRS – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Oct 2013 |
DBID | 97E RIA RIE AAYXX CITATION IQODW NPM 7SC 7SP 8FD JQ2 L7M L~C L~D 7X8 F28 FR3 |
DOI | 10.1109/TIP.2013.2262290 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Pascal-Francis PubMed Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional MEDLINE - Academic ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
DatabaseTitle | CrossRef PubMed Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional MEDLINE - Academic Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | PubMed Technology Research Database Technology Research Database MEDLINE - Academic |
Database_xml | – sequence: 1 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Applied Sciences Engineering |
EISSN | 1941-0042 |
EndPage | 3841 |
ExternalDocumentID | 3169623251 23674454 27783996 10_1109_TIP_2013_2262290 6514915 |
Genre | orig-research Research Support, Non-U.S. Gov't Journal Article |
GroupedDBID | --- -~X .DC 0R~ 29I 4.4 53G 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD F5P HZ~ H~9 ICLAB IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P RIA RIE RNS TAE TN5 VH1 AAYOK AAYXX CITATION RIG IQODW NPM 7SC 7SP 8FD JQ2 L7M L~C L~D 7X8 F28 FR3 |
ID | FETCH-LOGICAL-c410t-f304c28aae5426fd3ab9de1e9bb15d83f91096297298bdbea7c5eac14408ffa33 |
IEDL.DBID | RIE |
ISSN | 1057-7149 1941-0042 |
IngestDate | Fri Jul 11 06:36:57 EDT 2025 Fri Jul 11 10:03:00 EDT 2025 Mon Jun 30 10:19:04 EDT 2025 Thu Apr 03 07:06:24 EDT 2025 Wed Apr 02 07:49:46 EDT 2025 Sun Jul 06 05:04:59 EDT 2025 Thu Apr 24 23:02:24 EDT 2025 Wed Aug 27 02:03:32 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 10 |
Keywords | Encryption Decryption Optimization Image quality general access structures Visual secret sharing scheme Codebook pixel expansion Simulated annealing Security of data controllable display quality Binary image Secret sharing Cryptography Computer aid |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 CC BY 4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c410t-f304c28aae5426fd3ab9de1e9bb15d83f91096297298bdbea7c5eac14408ffa33 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 ObjectType-Article-2 ObjectType-Feature-1 |
PMID | 23674454 |
PQID | 1471971996 |
PQPubID | 85429 |
PageCount | 12 |
ParticipantIDs | pubmed_primary_23674454 crossref_citationtrail_10_1109_TIP_2013_2262290 proquest_journals_1471971996 ieee_primary_6514915 pascalfrancis_primary_27783996 crossref_primary_10_1109_TIP_2013_2262290 proquest_miscellaneous_1439726878 proquest_miscellaneous_1429639482 |
PublicationCentury | 2000 |
PublicationDate | 2013-10-01 |
PublicationDateYYYYMMDD | 2013-10-01 |
PublicationDate_xml | – month: 10 year: 2013 text: 2013-10-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York, NY |
PublicationPlace_xml | – name: New York, NY – name: United States – name: New York |
PublicationTitle | IEEE transactions on image processing |
PublicationTitleAbbrev | TIP |
PublicationTitleAlternate | IEEE Trans Image Process |
PublicationYear | 2013 |
Publisher | IEEE Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: Institute of Electrical and Electronics Engineers – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 adhikari (ref10) 2004; 3348 ref15 ref14 koga (ref16) 2002 ref2 hsu (ref8) 2006; 4203 ref17 ref18 ref7 ito (ref4) 1999; e82 a ref3 liu (ref9) 2010; 5 ref6 macpherson (ref11) 2002 ref5 naor (ref1) 1995; 950 |
References_xml | – ident: ref5 doi: 10.1109/TIFS.2011.2157144 – volume: 5 start-page: 27 year: 2010 ident: ref9 article-title: Step construction of visual cryptography schemes publication-title: IEEE Trans Inf Forensics Security doi: 10.1109/TIFS.2009.2037660 – ident: ref13 doi: 10.1016/j.ipl.2010.01.003 – ident: ref17 doi: 10.1007/978-3-642-34129-8_2 – ident: ref3 doi: 10.1016/j.patrec.2003.12.011 – volume: 3348 start-page: 399 year: 2004 ident: ref10 publication-title: Progress in Cryptology (LNCS) – volume: e82 a start-page: 2172 year: 1999 ident: ref4 article-title: Image size invariant visual cryptography publication-title: IEICE Trans Fundam – year: 2002 ident: ref11 publication-title: Grey Level Visual Cryptography for General Access Structures – ident: ref15 doi: 10.1016/S0304-3975(99)00243-1 – volume: 950 start-page: 1 year: 1995 ident: ref1 publication-title: Advances in Cryptology – volume: 4203 start-page: 58 year: 2006 ident: ref8 publication-title: Foundations of Intelligent Systems (LNAI) doi: 10.1007/11875604_8 – ident: ref12 doi: 10.1109/TIFS.2011.2167611 – start-page: 328 year: 2002 ident: ref16 publication-title: Advances in Cryptology ? ASIACRYPT?98 – ident: ref18 doi: 10.4304/jcp.3.12.68-75 – ident: ref2 doi: 10.1007/978-3-642-14298-7_5 – ident: ref14 doi: 10.1016/S0097-8493(98)00034-X – ident: ref7 doi: 10.1117/1.2353204 – ident: ref6 doi: 10.1006/inco.1996.0076 |
SSID | ssj0014516 |
Score | 2.2498252 |
Snippet | Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a... |
SourceID | proquest pubmed pascalfrancis crossref ieee |
SourceType | Aggregation Database Index Database Enrichment Source Publisher |
StartPage | 3830 |
SubjectTerms | Algorithms Applied sciences Construction controllable display quality Cryptography Design engineering Detection, estimation, filtering, equalization, prediction Exact sciences and technology general access structures Image processing Image quality Information, signal and communications theory Maintenance Mathematical analysis Mathematical models Optimization pixel expansion Pixels Signal and communications theory Signal processing Signal, noise Systematics Telecommunications and information theory Vectors Vectors (mathematics) Visual Visual secret sharing scheme Visualization |
Title | Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints |
URI | https://ieeexplore.ieee.org/document/6514915 https://www.ncbi.nlm.nih.gov/pubmed/23674454 https://www.proquest.com/docview/1471971996 https://www.proquest.com/docview/1429639482 https://www.proquest.com/docview/1439726878 |
Volume | 22 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT9wwEB1RTu2htNCPtBS5Ui-Vmt0kdmL7iCiIrURVCai4RXbsSCsgu2qSSsuv79jxpqUCxC2KZyNnZzx-kxm_AfgkUgSxPOGxUTSLGacy1jKpY82ZyqjJK67dAeeT78XxOft2kV9swJfxLIy11hef2Ym79Ll8s6h696lsWuDuLt2J8icYuA1ntcaMgWs46zObOY85iq1Tkomcns1-uBouOkGo4ejNHQEwLThjObu1G_n2Kq44UrX4_9RDY4v7kaffgY624GQ996Hw5HLSd3pS3fxH6_jYl3sBzwMUJfuD7byEDdtsw1aApSQs-nYbnv3DWbgD17NrdEHkdH5jyaz5jaE26ob8nLc9Puvg12rZBRJsgnCYBFZrsu_7MpJTz1bbY4hP0GO5T0CkW5Cv83Z5pVZk4PNYEddE1Leu6NpXcH50eHZwHIeeDXHF0qSLa5qwKhNK2Rz3_tpQpaWxqZVap7kRtEZ4IotMIqYX2mireJWj73cpZlHXitLXsNksGvsWiEbvk-IzENFYZrJCSVPlKJyIqkjxbgTTte7KKhCau8ldlT6wSWSJii-d4sug-Ag-j79YDmQeD8juOB2NckE9EezdMo9xPOMcsaYsIthd20sZ3EGL8RVPJU_98MdxGBeyy86oxi56J5OhM5RMZA_JIHzMCsFFBG8GW_w7gWDS7-6e-Ht46l5vqEPchU3Ut_2AeKrTe34h_QEdxRo1 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Rb9MwED5N4wF4YLDBCIxhJF6QSJvETmw_ToOphXVCWof2FtmJI1VsaUUSpO7Xc3bcwBBMvEXxNXJ65_Pn3N13AG9FjCCWRzwsFU1CxqkMtYyqUHOmElqmBde2wHl2lk0u2KfL9HIL3g-1MMYYl3xmRvbSxfLLZdHZT2XjDHd3aSvK76W2GLev1hpiBrblrIttpjzkKLgJSkZyPJ9-sVlcdIRgwxKcWwpgmnHGUnZrP3INVmx6pGrwH6r61hb_xp5uDzrZgdlm9n3qybdR1-pRcfMHseP_vt5jeOTBKDnqrecJbJl6F3Y8MCV-2Te78PA31sI9uJ5eoxMi54sbQ6b1Dzxso3bI10XT4bOOv69XrafBJgiIiee1JkeuMyM5d3y1HR7yCfos-xGItEvyYdGsrtSa9Iwea2LbiLrmFW3zFC5OPs6PJ6Hv2hAWLI7asKIRKxKhlElx969KqrQsTWyk1nFaClohQJFZIhHVC11qo3iRove3QWZRVYrSZ7BdL2vzHIhG_xPjMxDTGFYmmZJlkaJwJIosxrsBjDe6ywtPaW4nd5W7o00kc1R8bhWfe8UH8G74xaqn87hDds_qaJDz6gng8JZ5DOMJ54g2ZRbAwcZecu8QGjxh8Vjy2A2_GYZxKdv4jKrNsrMyCbpDyURylwwCyCQTXASw39virwl4k37x94m_hvuT-ew0P52efX4JD-yr9lmJB7CNujevEF21-tAtqp_uCh19 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+Size+Invariant+Visual+Cryptography+for+General+Access+Structures+Subject+to+Display+Quality+Constraints&rft.jtitle=IEEE+transactions+on+image+processing&rft.au=Lee%2C+Kai-Hui&rft.au=Chiu%2C+Pei-Ling&rft.date=2013-10-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1057-7149&rft.eissn=1941-0042&rft.volume=22&rft.issue=10&rft.spage=3830&rft_id=info:doi/10.1109%2FTIP.2013.2262290&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=3169623251 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1057-7149&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1057-7149&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1057-7149&client=summon |