High-quality Visual Cryptography of Real-value Images without Pixel Expansion using Fuzzy Random Grids

Document Type : Research Paper

Authors

1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran.

2 Department of Computer Engineering, Yazd University, Yazd, Iran.

Abstract

Visual cryptography is a method used to secure images by converting them into several shares that are finally stacked to recover the original image without any calculations. Most existing techniques that can encrypt gray and color images often convert them to binary or support only limited colors, which results in reducing the quality of recovered images. Pixel expansion is another problem with existing methods. Thus, a new approach is required to encrypt gray and color images with real value, without converting them to binary or limited-color images, and also without imposing any pixel expansions. Besides, generated shares should have security, and the recovered images should be of high quality. In this research, fuzzy random grids and a meta-heuristic algorithm are used for the share generation in the encryption step. Next, the decryption step uses the fuzzy OR operator to recover high-quality images. The evaluation results demonstrate the ability of the proposed solution in encrypting gray and color images without converting them to binary, and also without pixel expansion. Besides, the results show that the proposed method is secure as individual shares do not show any information from the original image. The quality of the decrypted images has also been evaluated using subjective and objective evaluation metrics, which prove the high quality of recovered images.

Keywords


[1] F. M. Aswad, I. Salman, S. A. Mostafa, An optimization of color halftone visual cryptography scheme based on Bat
algorithm, Journal of Intelligent Systems, 30(1) (2021), 816-835.
[2] H. Ayad, M. Khalil, Qam-dwt-svd based watermarking scheme for medical images, International Journal of Interac-
tive Multimedia and Arti cial Intelligence, (2018), 81-89.
[3] C. S. Baird, Absorption of electromagnetic radiation, AccessScience, 2019.
[4] J. Blesswin, M. Kumar, Secured communication method using visual secret sharing scheme for color images, Journal
of Internet Technology, 22(4) (2021), 803-810.
[5] C. Blundo, S. Cimato, A. De Santis, Visual cryptography schemes with optimal pixel expansion, Theoretical Com-
puter Science, 369(1-3) (2006), 169-182.
[6] N. Buckley, A. K. Nagar, S. Arumugam, On real-valued visual cryptographic basis matrices, Journal of Universal
Computer Science, 21(12) (2015), 1536-1562.
[7] B. Champagne, M. Guillaume, F. Zutterman, TDDFT investigation of the optical properties of cyanine dyes, Chem-
ical Physics Letters, 425(1-3) (2006), 105-109.
[8] J. Chandrasekaran, Chemistry of colours, Resonance, 6(3) (2001), 66-75.
[9] J. J. Chang, B. Y. Huang, J. S. Juan, A new visual multi-secrets sharing scheme by random grids, Cryptography,
2(3) (2018), 24.
[10] H. C. Chao, T. Y. Fan, Random-grid based progressive visual secret sharing scheme with adaptive priority, Digital
Signal Processing, 68 (2017), 69-80.
[11] H. C. Chao, T. Y. Fan, XOR-based progressive visual secret sharing using generalized random grids, Displays, 49
(2017), 6-15.
[12] H. C. Chao, T. Y. Fan, Generating random grid-based visual secret sharing with multi-level encoding, Signal
Processing: Image Communication, 57 (2017), 60-67.
[13] T. H. Chen, Y. S. Lee, C. H. Lin, On the diculty of aligning VSS random grids, Signal Processing: Image
Communication, 44 (2016), 101-107.
[14] P. L. Chiu, K. H. Lee, Ecient constructions for progressive visual cryptography with meaningful shares, Signal
Processing, 165 (2019), 233-249.
[15] S. Cimato, R. De Prisco, A. De Santis, Probabilistic visual cryptography schemes, The Computer Journal, 49(1)
(2006), 97-107.
[16] S. Cimato, R. De Prisco, A. De Santis, Colored visual cryptography without color darkening, Theoretical Computer
Science, 374(1-3) (2007), 261-276.
[17] M. A. Duraisamy, M. M. Sathiyamoorthy, M. S. Chandrasekar, Protection of privacy in visual cryptography scheme
using error di usion technique, International Journal of Computer Science and Network, 2(2) (2013).
[18] P. A. Eisen, D. R. Stinson, Threshold visual cryptography schemes with speci ed whiteness levels of reconstructed
pixels, Designs, Codes and Cryptography, 25(1) (2002), 15-61.
[19] R. Franzen, Kodak lossless true color image suite, http : / / r0k . us / graphics / kodak. (accessed:08.30.2023).
[20] A. Giri, Development of digital half toning techniques for Grayscale image, PhD thesis, 2014.
[21] M. Gupta, et al., An ecient image encryption technique based on two-level security for internet of things, Multi-
media Tools and Applications, 82(4) (2023), 5091-5111.
[22] C. Hegde, et al., Secure authentication using image processing and visual cryptography for banking applications,
2008 16th International Conference on Advanced Computing and Communications, (2008), 65-72.
[23] A. Hore, D. Ziou, Image quality metrics: PSNR vs. SSIM, 2010 20th International Conference on Pattern Recog-
nition, (2010), 2366-2369.
[24] Y. C. Hou, Visual cryptography for color images, Pattern Recognition, 36(7) (2003), 1619-1629.
[25] H. Hu, et al., General construction for XOR-based visual cryptography and its extended capability, Multimedia
Tools and Applications, 75 (2016), 13883-13911.
[26] B. Hu, et al., Subjective and objective quality assessment for image restoration: A critical survey, Signal Processing:
Image Communication, 85 (2020), 115839.
[27] O. Kafri, E. Keren, Encryption of pictures and shapes by random grids, Optics Letters, 12(6) (1987), 377-379.
[28] Y. Kang, et al., Visual cryptography based on ghost imaging and Hadamard transform, Quantum Information
Processing, 22(2) (2023), 116.
[29] S. Kumar, R. Sharma, Improving contrast in random grids based visual secret sharing, International Journal of
Security and Its Applications, 6(1) (2012), 9-28.
[30] P. Li, et al., A construction method of (2, 3) visual cryptography scheme, IEEE Access, 8 (2020), 32840-32849.
[31] C. C. Lin, W. H. Tsai, Visual cryptography for gray-level images by dithering techniques, Pattern Recognition
Letters, 24(1-3) (2003), 349-358.
[32] Z. Liu, et al., Weighted visual secret sharing for general access structures based on random grids, Signal Processing:
Image Communication, 92 (2021), 116129.
[33] N. A. E. S. Mohamed, A. Youssif, H. A. G. El-Sayed, Fast and robust image encryption scheme based on quantum
logistic map and hyperchaotic system, Complexity, 2022 (2022). DOI: 10.1155/2022/3676265.
[34] P. Mohammadi, A. Ebrahimi Moghadam, S. Shirani, Subjective and objective quality assessment of image: A
survey, arXiv preprint arXiv:1406.7799, (2014).
[35] M. Naor, A. Shamir, Visual cryptography, Advances in Cryptology{EUROCRYPT'94: Workshop on the Theory
and Application of Cryptographic Techniques Perugia, Italy, May 9{12, 1994 Proceedings 13. Springer, (1995), 1-12.
[36] J. S. Pan, et al., Visual cryptography scheme for secret color images with color QR codes, Journal of Visual
Communication and Image Representation, 82 (2022), 103405.
[37] C. S. Sanaboina, S. R. Odugu, G. Vanamadi, Secret image sharing using visual cryptography shares with acknowl-
edgment, International Journal of Innovative Technology and Exploring Engineering, 8(11) (2019), 3474-3481.
[38] U. Sara, M. Akter, M. S. Uddin, Image quality assessment through FSIM, SSIM, MSE and PSNR{a comparative
study, Journal of Computer and Communications, 7(3) (2019), 8-18.
[39] D. R. I. M. Setiadi, PSNR vs SSIM: Imperceptibility quality assessment for image steganography, Multimedia Tools
and Applications, 80(6) (2021), 8423-8444.
[40] G. Shen, et al., Perfect contrast XOR-based visual cryptography schemes via linear algebra, Designs, Codes and
Cryptography, 85 (2017), 15-37.
[41] H. Shi, et al., A robust and secure zero-watermarking copyright authentication scheme based on visual cryptography
and block GH feature, Multimedia Tools and Applications, 81(26) (2022), 38019-38051.
[42] S. J. Shyu, Image encryption by random grids, Pattern Recognition, 40(3) (2007), 1014-1031.
[43] S. J. Shyu, Image encryption by multiple random grids, Pattern Recognition, 42(7) (2009), 1582-1596.
[44] S. J. Shyu, M. C. Chen, Minimizing pixel expansion in visual cryptographic scheme for general access structures,
IEEE Transactions on Circuits and Systems for Video Technology, 25(9) (2015), 1557-1561.
[45] P. Singh, B. Raman, Reversible data hiding based on Shamir's secret sharing for color images over cloud, Informa-
tion Sciences, 422 (2018), 77-97.
[46] USC University of Southern California. The USC-SIPI Image Database. url: http://sipi.usc.edu/database. (ac-
cessed: 08.30.2023).
[47] Z. Wang, et al., Image quality assessment: From error visibility to structural similarity, IEEE Transactions on
Image Processing, 13(4) (2004), 600-612.
[48] Z. Wang, G. R. Arce, G. Di Crescenzo, Halftone visual cryptography via error di usion, IEEE Transactions on
Information Forensics and Security, 4(3) (2009), 383-396.
[49] D. S. Wang, et al., Optimal contrast grayscale visual cryptography schemes with reversing, IEEE Transactions on
Information Forensics and Security, 8(12) (2013), 2059-2072.
[50] D. S. Wang, F. Yi, X. Li, Probabilistic visual secret sharing schemes for grey-scale images and color images,
Information Sciences, 181(11) (2011), 2189-2208.
[51] G. Wei, Some similarity measures for picture fuzzy sets and their applications, Iranian Journal of Fuzzy Systems,
15(1) (2018), 77-89.
[52] X. Wu, Z. R. Lai, Random grid based color visual cryptography scheme for black and white secret images with
general access structures, Signal Processing: Image Communication, 75 (2019), 100-110.
[53] X. Wu, W. Sun, Improving the visual quality of random grid-based visual secret sharing, Signal Processing, 93(5)
(2013), 977-995.
[54] X. Wu, W. Sun, Extended capabilities for XOR-based visual cryptography, IEEE Transactions on Information
Forensics and Security, 9(10) (2014), 1592-1605.
[55] X. Wu, C. N. Yang, Invertible secret image sharing with steganography and authentication for AMBTC compressed
images, Signal Processing: Image Communication, 78 (2019), 437-447.
[56] X. Wu, C. N. Yang, Probabilistic color visual cryptography schemes for black and white secret images, Journal of
Visual Communication and Image Representation, 70 (2020), 102793.
[57] C. N. Yang, New visual secret sharing schemes using probabilistic method, Pattern Recognition Letters, 25(4)
(2004), 481-494.
[58] C. N. Yang, T. S. Chen, Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion, Pattern
Recognition Letters, 26(2) (2005), 193-206.
[59] C. N. Yang, C. C. Wang, T. S. Chen, Visual cryptography schemes with reversing, The Computer Journal, 51(6)
(2008), 710-722.
[60] C. N. Yang, Y. Y. Yang, On the analysis and design of visual cryptography with error correcting capability, IEEE
Transactions on Circuits and Systems for Video Technology, 31(6) (2020), 2465-2479.
[61] L. A. Zadeh, Fuzzy sets, Information and Control, 8(3) (1965), 338-353.
[62] D. Zhang, et al., HP-VCS: A high-quality and printer-friendly visual cryptography scheme, Journal of Visual
Communication and Image Representation, 78 (2021), 103186.