Visual Secret Sharing Scheme using Grayscale Images

Reading time: 5 minute
...

📝 Original Info

  • Title: Visual Secret Sharing Scheme using Grayscale Images
  • ArXiv ID: 1106.6242
  • Date: 2011-07-01
  • Authors: Sandeep Katta

📝 Abstract

Pixel expansion and the quality of the reconstructed secret image has been a major issue of visual secret sharing (VSS) schemes. A number of probabilistic VSS schemes with minimum pixel expansion have been proposed for black and white (binary) secret images. This paper presents a probabilistic (2, 3)-VSS scheme for gray scale images. Its pixel expansion is larger in size but the quality of the image is perfect when it's reconstructed. The construction of the shadow images (transparent shares) is based on the binary OR operation.

💡 Deep Analysis

📄 Full Content

1

Visual Secret Sharing Scheme using Grayscale Images Sandeep Katta Department of Computer Science, Oklahoma State University Stillwater, OK 74078

ABSTRACT: Pixel expansion and the quality of the reconstructed secret image has been a major issue of visual secret sharing (VSS) schemes. A number of probabilistic VSS schemes with minimum pixel expansion have been proposed for black and white (binary) secret images. This paper presents a probabilistic (2, 3)-VSS scheme for gray scale images. Its pixel expansion is larger in size but the quality of the image is perfect when it‟s reconstructed. The construction of the shadow images (transparent shares) is based on the binary OR operation.

KEYWORDS: visual secret sharing, 2-out-of-3 secret sharing, grayscale cryptography.

  1. INTRODUCTION

Secret sharing techniques belong to the larger area of information hiding that includes watermarking [1]-[8]. In secret sharing, random looking shares when brought together recreate the secret. In recursive secret sharing, the shares themselves have components defined at a lower recursive level [3]-[6]. The injection of the random bits in the shares may be done conveniently using d-sequences [9]-[11] or other random sequences. A grayscale image is an image in which the value of each single pixel is a sample, that is, it carries only intensity information. The darkest possible shade is black, which is the total absence of transmitted or reflected light and the lightest possible shade is white.
According to their physical characteristics, different media use different ways to represent the color level of images. The computer screen uses the electric current to control lightness of the pixels. The diversity of the lightness generates different color levels. The general printer, such as 2

dot matrix printers, laser printers, and jet printers can only control a single pixel to be printed (black pixel) or not to be printed (white pixel), instead of displaying the gray level. As such, the way to represent the gray level of images is to use the density of printed dots. The method that uses the density of the net dots to simulate the gray level is called “halftone” and transforms an image with gray level into a binary image before processing. Every pixel of the transformed halftone image has only two possible color levels (black or white). Because human eyes cannot identify too tiny printed dots and, when viewing a dot, tend to cover its nearby dots, we can simulate different gray levels through the density of printed dots, even though the transformed image actually has only two colors – black and white.
Visual secret sharing (VSS) schemes [1]-[4],[12] have been proposed only with black and white (binary) images. Several schemes for grayscale images [14] and for color images [13], [15] have been proposed. However, these earlier works result in a decrypted image of reduced quality. I here propose a new gray-level visual cryptography scheme and the image quality in this proposed scheme is better than anything and provides high quality images including that of perfect (original) quality to be reconstructed. The generation of the shadow images is based on Boolean operations, and the reconstruction operation uses OR, as in other VSS schemes.

  1. PROPOSED APPROACH

In the proposed scheme I convert each grayscale block into a binary block. First of all each pixel value in a grayscale block is transformed into binary representation. For example take a grayscale block and transform into binary blocks.

111 159 20

254 10 198

40 215 100

Its corresponding binary blocks are as follows: 3

[0 1 1 0 1 1 1 1]

[1 0 0 1 1 1 1 1]

[0 0 0 1 0 1 0 0]; [1 1 1 1 1 1 1 0]

[0 0 0 0 1 0 1 0]

[1 1 0 0 0 1 1 0]; [0 0 1 0 1 0 0 0]

[1 1 0 1 0 1 1 1]

[0 1 1 0 0 1 0 0]. Take each binary block and go for different possible combinations of that block, and try to design the block into different shares. For example take a grayscale block and divide the block into shares and apply the above scheme.

2.1
Two-out-of-Three Scheme using Grayscale Images This proposed scheme is totally different from that of previous schemes. Here I design the shares such a way that when combining any two shares will reveal the original bit information, but not the whole share just half of each single share will give me high quality image when reconstructed. I will explain this scheme by taking a value from the grayscale block and divide that value into shares. 254: [1 1 1 1 1 1 1 0]

1st half 2nd half Share1:
0 1 0 1 0 1 0 0
1 1 0 1 1 0 1 0 Share2:
1 0 1 0 1 0 1 0
1 1 1 0 1 1 1 0 Share3:
0 0 1 0 0 1 0 0
1 0 0 1 0 1 0 0 Table-1: Grayscale bits are transformed into Binary bits

Share1 (1st half): 0 1 0 1 0 1 0 0

Share3 (1st half): 0 0 1 0 0 1 0 0
Share2 (1st half): 1 0 1 0 1 0 1 0

Share1 (2nd half): 1 1 0 1 1 0 1 0

1 1 1 1 1 1 1 0 = 2

Reference

This content is AI-processed based on open access ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut