Formatted contents note |
Visual Cryptography from Halftone Error Diffusion<br/>Gonzalo R. Arce. Zhongmin Wang, and Giovanni Di Crescenzo<br/>1.1 Introduction<br/>1.1.1 Visual Cryptography<br/>1.1.2 Halftone Visual Cryptography<br/>1.1.3 Blue Noise Error Diffusion .<br/>1.2 Visual Secret Sharing<br/>1.2.1 Notion and Formal Definitions<br/>1.2.2 Construction of VSS Scheme .<br/>1.3 Halftone VSS Construction Using Error Diffusion<br/>1.3.1 Share Structure<br/>1.3.2 Distribution of SIPs and ABPs<br/>1.3.3 Generation of Halftone Shares via Error Diffusion<br/>1.4 Halftone VSS Construction Using Parallel Error Diffusion<br/>1.5 Quality of Halftone Shai'es<br/>1.6 Discussion<br/>1.6.1 Improvement ot image Quality .<br/>1.6.2 Comparison with Other Methods<br/>1.6.3 Image Decoding<br/>1.7 Simulation Results<br/>1.8 Conclusion<br/>Bibliography<br/>Visual Cryptography for Color Images<br/>Stelvio Cimato, Roberto De Frisco, and Alfredo De Santis<br/>2.1 Introduction<br/>2.2 Color Superposition<br/>2.2.1 Color Vision and Color Models<br/>2.2.2 Lattices .<br/>2.2.3 The Darkening Problem . .<br/>2.2.4 The Annihilator Color . . .<br/>2.2.5 The Identity Color<br/>2.3 Formal Models for Colored VCS<br/>2.3.1 The Models for B&W-VC<br/>2.3.2 The Models for Color-VC<br/>2.3.3 The SC, ND, and General Models<br/>2.3.4 Base Matrices . . . .<br/>2.4 Schemes for the SC Model<br/>2.4.1 The VV Schemes .<br/>2.4.2 The BDD Schemes<br/>2.4.3 The KY and YL Schemes<br/>2.4.4 The CDD Schemes and a Lower Bound<br/>2.5 Schemes for the ND Model . .<br/>2.6 Schemes for the General Model<br/>2.6.1 (2,2)-Threshold Schemes<br/>2.6.2 The (2, n)-Threshold AS Schemes .<br/>2.7 Other Schemes<br/>2.8 Conclusions . .<br/>Bibliography<br/>Visual Cryptography for Multiple Secrets<br/>Shyong Jian Shyu<br/>3.1 Introduction . . . o. • o u<br/>3.2 Naor and Shamir's Basic Visual Secret Sharing Scheme .<br/>3.3 Visual Two-Secret Sharing Schemes<br/>3.3.1 Wu and Chen's Scheme . .<br/>3.3.2 Wu and Chang's Scheme . .<br/>3.4 Visual Multiple-Secret Sharing Schemes<br/>3.4.1 Shyu et al.'s Scheme .<br/>3.4.1.1 Informal Description<br/>3.4.1.2 Encoding Circle Share A .<br/>3.4.1.3 Encoding Circle Share B<br/>3.4.1.4 General Algorithm .<br/>3.4.2 Feng et al.'s Scheme .<br/>3.4.3 Experimental Results<br/>3.4.4 Comparison and Discussions<br/>3.5 Concluding Remarks<br/>Bibliography .<br/>Extended Visual Cryptography for Photograph Images<br/>Yasushi Yamaguchi<br/>4 1 Introduction . •<br/>4 2 Basic Visual Cryptography Schemes .<br/>4 2 1 (fc, n) Visual Secret Sharing Schemes .<br/>4.2.2 Extended Visual Cryptography Scheme . .<br/>4.2.3 Random Grids<br/>4.3 Fundamentals of Photograph Visual Cryptography<br/>4.3.1 Digital Halftoning . .<br/>4.3.2 Image Quality and Related Parameters<br/>4.3.3 Photograph Visual Cryptography with Basic Schemes<br/>4.4 Variations of Photograph Visual Cryptography<br/>4.4.1 Approaches to Photograph Visual Cryptography<br/>4.4.2 Random-Dot Shadow Images .<br/>4.4.3 Similar Shadow Images . .<br/>4.4.4 Positive and Negative Shadow Images<br/>4.4.5 Error and Secret Diffusion . . .<br/>4.4.6 Simultaneous Iterative Search .<br/>4.4.7 Tone Adjustment<br/>4.4.8 Continuous-Tone Subpixel<br/>4.5 Misalignment-Tolerant Photograph Visual Cryptography<br/>4.5.1 Theory and Implementation .<br/>4.5.2 Results<br/>4.6 Conclusions . .<br/>Bibliography . . . .<br/>Probabilistic Visual Cryptography Schemes<br/>Stelvio Cimato, RobeHo De Frisco, and Alfredo De Santis<br/>5.1 Introduction<br/>5.2 Visual Cryptography Schemes .<br/>5.2.1 The Deterministic Model<br/>5.2.2 The Probabilistic Model .<br/>5.3 Canonical Probabilistic Schemes<br/>5.4 Probabilistic Schemes with No Pixel Expansion<br/>5.5 Trading Pixel Expansion with Probabilities .. .<br/>5.5.1 Probabilistic Schemes with Given Pixel Expansion .<br/>5 6 Constructing Probabilistic Schemes .<br/>5.6.1 (n, n)-Threshold Probabilistic Schemes with Any Pixel<br/>Expansion . . .<br/>5.6.2 (2, n)-Threshold Probabilistic Schemes with Any Pixel<br/>Expansion .<br/>5.7 Probabilistic Schemes with Boolean Operations<br/>5.7.1 (2,n) Scheme for Binary Images (Wang)<br/>5.7.2 (n,n) Scheme for Binary Images (Wang)<br/>5.8 Conclusions and Open Problems<br/>Bibliography<br/>6 XOR-Based Visual Cryptography<br/>Daoshun Wang and Lin Dong<br/>6.1 Introduction<br/>6.2 Preliminaries<br/>6.3 Visual Cryptography Scheme Using the Polarization of Light<br/>6.3.1 {2, n) Scheme<br/>6.3.2 (n. n) Scheme<br/>6.3.3 (ic, n) Scheme<br/>6.4 Visual Cryptography Scheme with Reversing<br/>6.4.1 {k, n) VC Scheme Using Cyclic-Shift Operation<br/>6.4.2 A Scheme for General Access Structure .<br/>6.5 Secret Sharing Scheme Using Boolean Operation<br/>6.5.1 {2, n) Scheme<br/>6.5.2 (n, n) Scheme<br/>6.5.3 {k, n) Scheme<br/>6.6 Conclusion<br/>Bibliography . .<br/>7 Visual Cryptography and Random Grids<br/>Shyong Man Shyu<br/>7.1 Introduction .<br/>7.2 Random Grids<br/>7.2.1 Random Pixel, Random Grid, and Average Light Ti-ans-<br/>mission<br/>7.2.2 Superimposition of Random Grids<br/>7.3 Visual Cryptograms of Random Grids . .<br/>7.3.1 Definition of VCRG .<br/>7.3.2 (2, 2)-VCRG Algorithms for Binary Images .<br/>7.3.3 Experiments for (2, 2)-VCRG .<br/>7.3.4 Definition of Light Contrast and Performance Evalu<br/>ation .<br/>7.3.5 Algorithms of (n, n)-VCRG for Binary Images<br/>7.3.6 Algorithms of (n, n)-VCRG for Gray-Level and Color<br/>Images .<br/>7.3.7 Experiments for (n, n)-VCRG .<br/>7.4 Concluding Remarks<br/>Bibliography<br/>8 Visual Cryptography and Contrast Bounds<br/>Andreas Klein<br/>8.1 Introduction<br/>8.2 Preliminaries<br/>8.3 Approximate Inclusion Exclusion<br/>8.4 Designs and Codes .<br/>8.5 Optimal 3-out-of-n Schemes<br/>8.6 Asymptotic Optimal A>out-of-n Schemes<br/>8.7 Contrast Tiade-OfTs for Extended Visual Cryptography<br/>Schemes<br/>8.8 Enhancing the Contrast by Nonstandard Models<br/>8.9 Conclusion<br/>Bibliography . .<br/>9 Visual Cryptography Schemes with Reversing<br/>Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci<br/>9.1 Introduction<br/>9.2 Visual Cryptography Schemes<br/>9.2.1 (A:, A:)-Threshold Visual Cryptography Schemes<br/>9.2.2 Perfect Black Visual Cryptography Schemes . .<br/>9.3 Almost Ideal Contrast VCS with Reversing<br/>9.4 Ideal Contrast VCS with Reversing . . . .<br/>9.4.1 A Construction Using a Binary Secret Sharing Scheme<br/>9.4.2 Constructions Using Perfect Black VCSs .<br/>9.4.2.1 The Scheme by Cimato, De Santis, Ferrara,<br/>and Masucci .<br/>9.4.2.2 The Scheme by Hu and Tzeng<br/>9.4.2.3 The Scheme by Yang, Wang, and Chen<br/>9.4.2.4 Comparisons .<br/>9.4.3 A Construction Using a Nonperfect Black VCS .<br/>9.5 Conclusions<br/>Bibliography . .<br/>10 Cheating Prevention in Visual Cryptography<br/>Yu-Chi Chen, Gwoboa Homg, and Du-Shiau Tsai<br/>10.1 Introduction<br/>10.2 Preliminaries<br/>10.2.1 Visual Cryptography .<br/>10.2.2 Cheating in VC .<br/>10.3 Cheating Prevention Schemes<br/>10.3.1 HCTl and HCT2<br/>10.3.2 HT . .<br/>10.3.3 TCH .<br/>10.3.4 PSl and PS2<br/>10.4 Analysis of Cheating Prevention Schemes<br/>10.5 Conclusions<br/>Bibliography . .<br/>11 Resolving the Alignment Problem in Visual Cryptography<br/>Feng Liu<br/>11.1 Introduction<br/>11.2 Preliminaries<br/>11.3 Misalignment with Integer Number of Subpixels<br/>11.4 Misalignment with Less Than One Subpixel<br/>11.4.1 Shares with Slightly Misalignment Can Still Recover the<br/>Secret Image<br/>11.4.2 Large Subpixels Have Better Misalignment Tolerance .<br/>11.5 A Misalignment Tolerant VCS<br/>11.5.1 The Algorithm<br/>11.5.2 Simulations . .<br/>11.6 Conclusions and Discussions<br/>11.7 Acknowledgments<br/>Bibliography<br/>12 Applications of Visual Cryptography<br/>Bemd Borchert and Klaus Reinhardt<br/>12.1 Introduction .<br/>12.2 Trojan-Secure Confirmation of Transactions<br/>12.3 Trojan-Secure Authentication Using a PIN .<br/>12.4 Security versus Multiple Use<br/>12.5 Using Refraction<br/>12.6 Technical Problems Concerning Adjustment and Parallaxes .<br/>12.7 Voting with a Receipt Baised on visual cryptography<br/>12.8 Conclusion<br/>Bibliography . .<br/>13 Steganography in Halftone Images<br/>Oscar C. An, Yuanfang Guo, and John S. Ho<br/>13.1 Introduction<br/>13.2 A Review of Error Diffusion<br/>13.3 Data Hiding by Stochastic Error Diffusion (DHSED)<br/>13.4 Data Hiding by Conjugate Error Diffusion (DHCED)<br/>13.5 Performance Analysis<br/>13.6 Summary<br/>Bibliography . .<br/>14 Image Secret Sharing<br/>WeiQi Van, Jonathan Weir, and Mohan S. Kankanhalli<br/>14.1 Introduction .<br/>14.2 State of the Art<br/>14.3 Approaches for Image Sharing<br/>14.3.1 Shamir's Secret Sharing Scheme<br/>14.3.2 Color Image Sharing Based on the Lagrange Interpola<br/>tion<br/>14.3.3 Color Image Sharing Based on Moving Lines<br/>14.3.4 Improved Algorithm<br/>14.4 Experiment and Evaluation<br/>14.5 Conclusion<br/>Bibliography .<br/>15 Polynomial-Based Image Sharing<br/>Shiuh-Jeng Wang, Chen-Hsing Yang, and Yu-Ting Chen<br/>15.1 Introduction .<br/>15.2 Polynomial-Based Sharing Scheme . .<br/>15.2.1 Shamir's Secret Sharing Scheme<br/>15.2.2 Lagrange Interpolation Scheme<br/>15.3 Preliminaries and Related Works .<br/>15.3.1 Thien-Lin Scheme .<br/>15.3.2 Lin-Tsai Scheme . .<br/>15.3.3 Yang et al.'s Scheme<br/>15.3.4 Inverted Pattern LSB Scheme .<br/>15.3.5 Scalable Secret Image Sharing .<br/>15.4 Wang et al.'s Scheme . . . .<br/>15.4.1 Secret Image Sharing .<br/>15.4.2 Set-Up Authentication<br/>15.4.3 Main Algorithms<br/>15.5 Experimental Results .<br/>15.5.1 Fidelity Analysis<br/>15.5.2 Evaluating Authentication . . .<br/>15.6 Conclusions<br/>Bibliography . .<br/>16 Image Sharing with Steganography and Authentication<br/>Zhao-Xia Yin, Chia-Chen Lin, and Chin-Chen Chang<br/>16.1 Introduction .<br/>16.2 Related Work<br/>16.2.1 Lin and Tsai's Scheme<br/>16.2.2 Yang et al.'s Scheme .<br/>16.2.3 Chang et al.'s Scheme<br/>16.3 Adopted Techniques in the Proposed Scheme<br/>16.3.1 Error Diffusion Technique<br/>16.3.2 Interpolation Technique .<br/>16.3.3 Canny Edge Detector. . .<br/>16.3.4 Edge Lookup Inverse Halftoning Technique<br/>16.3.5 Shamir Scheme for Secret Sharing .<br/>16.4 Proposed Scheme .<br/>16.4.1 Sharing and Embedding Phase . . .<br/>16.4.2 Reconstruction and Verifying Phase<br/>16.5 Experimental Results<br/>16.6 Conclusions<br/>Bibliography . .<br/>17 Two-Decoding-Option Image Sharing Method<br/>Ching-Nung Yang. Chuei-Bang Ciou. and Tse-Shih Chen<br/>17.1 Introduction<br/>17.2 Preliminaries<br/>17.2.1 PISSS<br/>17.2.2 VCS .<br/>17.3 Previous Works<br/>17.3.1 Jin et al.'s TiOISSS . .<br/>17.3.2 Lin and Lin's TiOISSS<br/>17.4 A New (fe, n)-TiOISSS .<br/>17.4.1 Design Concept .<br/>17.4.2 The Lossless TiOISSS<br/>17.5 Experimental Results and Comparisons<br/>17.6 Conclusion<br/>Bibliography . |