Subliminal Channels in Visual Cryptography

This paper describes three methods of creating a subliminal channel in visual cryptography that are defined for a (2,2) sharing scheme. They work by hiding additional covert information besides the original encrypted image. The first channel is revealed when the user folds the share along the specif...

Full description

Saved in:
Bibliographic Details
Published inCryptography Vol. 6; no. 3; p. 46
Main Authors Koptyra, Katarzyna, Ogiela, Marek R
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 01.09.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This paper describes three methods of creating a subliminal channel in visual cryptography that are defined for a (2,2) sharing scheme. They work by hiding additional covert information besides the original encrypted image. The first channel is revealed when the user folds the share along the specific axis. The second channel encodes subpixels on the basis of the encrypted message bits. It is designed to hide a wide range of data types. The third channel may be applied to a single share or multiple shares and is revealed when the proper parts of the shares are stacked. Fold and overlapping algorithms are adequate for printed shares, but the encryption method is only suitable for digital shares. The capacity of these methods ranges from half of the image size to the whole image size. The presented algorithms work on black-and-white images but are expandable to color visual cryptography. They may find applications in steganography and other data-hiding techniques. The created subliminal channels do not interfere with regular images that may still be revealed by stacking the shares. In short, this article introduces subliminal channels in visual cryptography, presents three algorithms for both binary and colorful images, shows examples of use with the results obtained, and discusses features of each method.
ISSN:2410-387X
2410-387X
DOI:10.3390/cryptography6030046