We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Performance of Error Filters on Shares in Halftone Visual Cryptography via Error Diffusion

by Anshul Sharma, Sunil Agrawal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 45 - Number 12
Year of Publication: 2012
Authors: Anshul Sharma, Sunil Agrawal
10.5120/6832-9420

Anshul Sharma, Sunil Agrawal . Performance of Error Filters on Shares in Halftone Visual Cryptography via Error Diffusion. International Journal of Computer Applications. 45, 12 ( May 2012), 23-30. DOI=10.5120/6832-9420

@article{ 10.5120/6832-9420,
author = { Anshul Sharma, Sunil Agrawal },
title = { Performance of Error Filters on Shares in Halftone Visual Cryptography via Error Diffusion },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 45 },
number = { 12 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 23-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume45/number12/6832-9420/ },
doi = { 10.5120/6832-9420 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:38:34.014750+05:30
%A Anshul Sharma
%A Sunil Agrawal
%T Performance of Error Filters on Shares in Halftone Visual Cryptography via Error Diffusion
%J International Journal of Computer Applications
%@ 0975-8887
%V 45
%N 12
%P 23-30
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual cryptography encodes a secret binary image (SI) into shares of random binary patterns. The decoding process of a visual cryptography scheme, which differs from traditional secret sharing, does not need any cryptographic algorithms like symmetric and asymmetric algorithms. Visual cryptography is based on the images and is obtained by sending pixel information and stacking of pixels for recovery of the secret image. Instead of using binary patterns of the shares, which does not give any visual meaning and hinder the objectives of visual cryptography, halftone visual cryptography via error diffusion is used that encodes a secret binary image into n halftone shares (images) carrying significant visual information. When secrecy is important factor rather than the quality of recovered image the shares must be of better visual quality. Error diffusion has low complexity and provides halftone shares with good image quality. Different filters such as Floyd-Steinberg, Jarvis, Stuki, Burkes, Sierra, and Stevenson's-Arce are used and their impact on visual quality of shares is seen. The simulation shows that error filters used in error diffusion lays a great impact on the visual quality of the shares and better shares can be obtained by using complex filters without affecting the objectives of visual cryptography.

References
  1. M. Naor and A. Shamir, "Visual cryptography," Advances in Cryptograhy:EUROCRYPT'94, LNCS, vol. 950, pp. 1–12, 1995.
  2. T. Hofmeister, M. Krause, and H. U. Simon, "Contrast-optimal k out of n secret sharing schemes in visual cryptography," Theoret. Comput. Sci. , vol. 240, no. 2, pp. 471–485, Jun. 2000.
  3. G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, "Visual cryptography for general access structures," Inf. Comput. , vol. 129, no. 2, pp. 86–106, Sep. 1996.
  4. C. Blundo, A. De Santis, and M. Naor, "Visual cryptography for grey level images," Inf. Process. Lett. , vol. 75, pp. 255–259, 2000.
  5. Z. Zhou, G. R. Arce, and G. Di Crescenzo, "Halftone visual cryptography," IEEE Trans. Image Process. , vol. 15, no. 8, pp. 2441– 2453, Aug. 2006.
  6. Z. Zhou, G. R. Arce, and G. Di Crescenzo, "Halftone visualcryptography via Error Diffusion," IEEE Trans. on InformationForensics And Security, Vol. 4, No. 3. , Sep. 2009
  7. C. Blundo, P. D'Arco, A. De Santis, and D. R. Stinson. Contrast optimal threshold visual cryptography schemes. SIAM J. Discrete Math. 16 (2):224{261, 2003.
  8. D. L. Lau, R. Ulichney, and G. R. Arce, "Blue- and green-noise halftoning models—A review of the spatial and spectral characteristics of halftone textures," IEEE Signal Process. Mag. , vol. 10, no. 4, pp. 28–38, Jul. 2003.
  9. Floyd, R. W. and L. Steinberg, "An Adaptive Algorithm for Spatial Gray Scale. " SID 1975, International Symposium Digest of Technical Papers, vol 1975m, pp. 36-37.
  10. Jarvis, J. F. , C. N. Judice, and W. H. Ninke, "A Survey of Techniques for the Display of Continuous Tone Pictures on Bi-Level Displays," Computer Graphics and Image Processing, vol. 5, pp. 13-40, 1976.
  11. Stucki, P. , "MECCA - a multiple-error correcting computation algorithm for bilevel image hardcopy reproduction. " Research Report RZ1060, IBM Research Laboratory, Zurich, Switzerland, 1981.
  12. Daniel Burkes, Presentation of the Burkes error filter for use in preparing continuous-tone images for presentation on bi-level devices, in LIB 15 (Publications), CIS Graphics Support Forum, September 15, 1988 (unpublished)
  13. Frankie Sierra, in LIB 17 (Developer's Den), CIS Graphics Support Forum (unpublished)
  14. R. L. Stevenson and G. R. Arce,"Binary display of hexagonally sampled continuous-tone images,"Journal of the Optical Society of America a 2, pp. 1009{1013, July 1985}.
  15. Zhou Wang and Alan C. Bovik;"A Universal image quality index,"IEEE Signal processing letters, vol XX, no. Y, march 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Error Diffusion Halftone Visual Cryptography Secret Sharing