[Volume 1, Issue 1] 4. Color transparency based visual cryptography with high capacity data hiding and multiple secret sharing
2021-03-11 Hao Luo*, Ajith Abraham, and Jeng-Shyang Pan 

Abstract:

Visual cryptography is a powerful technique for image encryption and secret sharing. The main advantage lies in the fact that secret decryption is based on transparencies stacking mechanism, i.e., no extra computer participation is required. In recent years, much attention is paid to high contrast and low transparency size expansion schemes. Besides, some additional abilities are incorporated into the conventional visual cryptography model, e.g., confidential data hiding and multiple secret sharing. Nevertheless, the outputs of most available approaches of this kind are monochrome transparencies. This paper extends the monochrome transparencies based principle to color transparencies. In particular, two schemes are proposed tailored for high capacity confidential data hiding and multiple secret sharing. Due to transparency colorization, the hiding capacity is enhanced in comparison with previous schemes based on monochrome transparencies. Meanwhile, the transparency is the same size as that of the secret images. The properties of stacking decryption mechanism and security are still well preserved. Extensive experimental results and examples demonstrate the effectiveness and efficiency of the proposed method.

Keywords:

Visual cryptography, Color transparency, Multiple secret sharing, High capacity data hiding, Size expansion.

Authors and contacts:

Hao Luo*, School of Aeronautics and Astronautics, Zhejiang University, 38 Zheda Road, Hangzhou, 310027, China, luohao@zju.edu.cn

Ajith Abraham, Machine Intelligence Research Labs, Auburn, WA, United States, ajith.abraham@ieee.org

Jeng-Shyang Pan, College of Computer Science and Engineering, Shandong University Of Science and Technology, 579 Qianwangang Road, Qingdao, 266590, China, jspan@cc.kuas.edu.tw

Citation:

Hao Luo, Ajith Abraham, Jeng-Shyang Pan, “Color transparency based visual cryptography with high capacity data hiding and multiple secret sharing”, Journal of Computer Security and Data Forensics, Vol. 1, No. 1, pp. 42~59, March 2021.