12.07.2015 Views

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

138 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 2, NO. 2, MAY 2010The six patterns <strong>of</strong> shares created based on the abovematrices are shown <strong>in</strong> figure 1. Note that one pixel <strong>of</strong> theorig<strong>in</strong>al image now corresponds to four pixels <strong>in</strong> eachshare.(c) The second shareFig 1: The six patterns <strong>of</strong> 4 pixel shares: vertical,horizontal and diagonalA visual cryptography scheme can then beconstructed by pick<strong>in</strong>g shares <strong>in</strong> the follow<strong>in</strong>g manner:a) If the pixel <strong>of</strong> the orig<strong>in</strong>al b<strong>in</strong>ary image iswhite, randomly pick the same pattern 0 <strong>of</strong> f ourpixels for both shares. It is important to pick thepatterns randomly <strong>in</strong> order to make the patternrandom.b) If the pixel <strong>of</strong> the orig<strong>in</strong>al image is black, pick acomplementary pair <strong>of</strong> patterns, i.e., the patternsfrom the same column <strong>in</strong> figure 1.It can be easily verified that the resultant scheme hasthe parameters [m = 4; α= 12 ; γ= 6]: any two shares <strong>of</strong>C 0 cover two out f our <strong>of</strong> the pixels, while any pair <strong>of</strong>shares from C 1 covers all the f our pixels. An example <strong>of</strong>the above scheme is shown <strong>in</strong> figure 2. The first image isthe orig<strong>in</strong>al image, the next two are the shares and the lastimage is the recovered orig<strong>in</strong>al image obta<strong>in</strong>ed byperform<strong>in</strong>g the equivalent <strong>of</strong> physically stack<strong>in</strong>g twoimage shares on top <strong>of</strong> each other (assum<strong>in</strong>g that they arepr<strong>in</strong>ted on transparencies). It should be noted that the lastthree images <strong>in</strong> figure 2 are four times as large as the firstone but I have scaled them to the same size as the orig<strong>in</strong>alimage.(a) Sample <strong>of</strong> monochrome image(d) The stacked ImageFig 2. Implementation <strong>of</strong> exist<strong>in</strong>g methodologyIII. RELATED WORKThere has been a steadily grow<strong>in</strong>g <strong>in</strong>terest <strong>in</strong> visualcryptography. Despite its appearance <strong>of</strong> be<strong>in</strong>g a simpletechnique, visual cryptography is a secure and effectivecryptographic scheme. S<strong>in</strong>ce the orig<strong>in</strong> <strong>of</strong> this newparadigm, various extensions to the basic scheme havebeen developed to improve the contrast and the areas <strong>of</strong>application have also been greatly expanded.In [1], the construction <strong>of</strong> (n,n)-VCS was extended for(k,n)-VCS. In 1996, the same authors <strong>in</strong>troduced the idea<strong>of</strong> cover based semi-group to further improve the contrast[3]. Ateniese et al. [4] provided the first construction <strong>of</strong>(2, n)-VCS hav<strong>in</strong>g the best possible contrast for any n·2.Blundo et al. [5] provided a contrast optimal (3,n)-VCSand gave a pro<strong>of</strong> on the upper bound on the contrast <strong>of</strong>any (3,n)-VCS. [1] first considered the problem <strong>of</strong>conceal<strong>in</strong>g the existence <strong>of</strong> the secret image. [6] provideda general solution for that problem.The random nature <strong>of</strong> secret shares makes sharesunsuitable for transmission over an open channel. [6]used a modified scheme to embed some mean<strong>in</strong>gfulimages <strong>in</strong>to the shares. [7] used different moiré patternsto visualize the secret <strong>in</strong>stead <strong>of</strong> different gray levels. Asfar as extend<strong>in</strong>g to color images goes, [8] provided aprimitive scheme for images <strong>of</strong> 24 colors. Hou [9] thenproposed a novel approach to share color images basedon halfton<strong>in</strong>g. Other <strong>in</strong>terest<strong>in</strong>g topics <strong>in</strong>clude visualauthentication [10] and watermark<strong>in</strong>g based on visualcryptography [11]. Recently, there has been an attempt tobuild a physical visual cryptographic system based onoptical <strong>in</strong>terferometry [12]. However, all <strong>of</strong> these earlierworks result <strong>in</strong> a decrypted image <strong>of</strong> reduced quality.(b) The first Share© 2010 ACADEMY PUBLISHER

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!