Abstract
In Visual Cryptographic Scheme (VCS), the shares of the secret image are viewed as random whereas in Extended Visual Cryptographic Scheme (EVCS), the shares are viewed as meaningful images. When the number of participants increases the graying effect problem in deterministic VCS is caused due to high pixel expansion. This graying effect was resolved using ideal contrast constructions in VCS, but not in EVCS. In ideal contrast VCS; combinations of Boolean operations are used during reconstruction. Here in this paper, we designed a deterministic construction for \((t,k,n)\) access structure using the existing VCS constructions with contrast one as building block. In existing EVCS constructions the relative contrast will vary depending on the access structure, but in the proposed EVCS construction it is 0.25, which is better than existing schemes.
Access provided by Autonomous University of Puebla. Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
In Visual cryptographic scheme, dealer constructs random shares from a secret image (SI) and then distributes shares to participants. During sufficient participants join their shares, the reconstructed image (RI) will be produced. Based on the pixel expansion and the contrast value [1], the quality of a VCS is measured. XOR, OR, AND and NOT are the Boolean operations used for reconstruction in VCS. In deterministic VCS all the black and white pixels of SI will be reconstructed in RI, but in probabilistic VCS [11] the correct reconstruction cannot be assured. VCS was pioneered by Naor et al. [1] in 1994. The deterministic VCS for general access structures are introduced in papers [2, 3, 12]. The constructions given in papers [3, 4] reconstruct the black pixel without distortion. For VCS constructions with contrast value one, the secret SI is generated without loss of resolution using combined Boolean operations [5,6,7, 27]. EVCS is a type of VCS developed by Ateniese et al. [13] where the encoded shares of SI are viewed as meaningful image. Schemes given in papers [13,14,15,16,17,18,19,20] are EVCS with pixel expansion and constructions given in papers [21,22,23,24,25,26] are EVCS without pixel expansion.
Let \(P = \left\{ {p_1 ,p_2 ,p_3 , \ldots ,p_t ,p_{t + 1} ,p_{t + 2} , \ldots ,p_n } \right\}\) be the set of participants, and 2P denotes the power set of P. Let us denote \(\Gamma_{Qual}\) as qualified set and \(\Gamma_{Forb}\) as forbidden set where \(\Gamma_{Qual} \cap \Gamma_{Forb} = {\text{\O }}\). Any set \(A \in \Gamma_{Qual}\) can recover SI whereas any set \(A \in \Gamma_{Forb}\) cannot recover SI. Let ΓQM = {A ∈ ΓQual:\(A^{\prime}\) \(\notin\) ΓQual for all \(A^{\prime}\) \(\subseteq\) A, \(A^{\prime}\) ≠ A} be the set of minimal qualified subset of P. Let ΓFM be denoted as the maximum forbidden set of P. Then the pair \(\Gamma = (\Gamma_{Qual} ,\Gamma_{Forb} )\) is denoted as the access structure of the scheme. Let S be a \(n \times m\) Boolean matrix and \(A \subseteq P\). The vector obtained by applying the Boolean operation (e.g.: OR) using rows of S corresponding to the elements of A is denoted by SA. Then \(w(S_A )\) is denoted as the Hamming weight of vector SA. The definition for contrast and security of the VCS are given in [3].
Define two sets \(L = \left\{ {p_1 ,p_2 ,p_3 , \ldots ,p_t } \right\}\) and \(R = \left\{ {p_{t + 1} ,p_{t + 2} , \ldots ,p_n } \right\}\) which contains t respectively \((n - t)\) participants. For a \((t,k,n)\)-EVCS the minimal qualified set is represented as ΓQM = {A: A \(\subseteq\) P, L ∈ A and \(\left| A \right|\)= k}. It is mandatory that all the participants in the set L and any k participants from set R need to involve in the reconstruction phase of a \((t,k,n)\)-EVCS [8,9,10].
In this paper, we propose a deterministic EVCS for \((t,k,n)\) access structure with a related contrast of 0.25. Our scheme is applicable only for sharing binary images. In the deterministic EVCS given in papers [13, 14, 16,17,18,19,20], each of the participants carry single meaningful image as share. Our proposed constructions are similar to the deterministic EVCS given in paper [15], where each of the participants carries multiple meaningful images as shares. Our EVCS has better reconstruction image quality than the deterministic EVCS constructions given in papers [13,14,15,16,17,18,19,20]. Table 1 describes the notations used in our algorithm.
2 A (t, k, n)-EVCS with Reduced Pixel Expansion
Let us define a set \(L = \left\{ {p_1 ,p_2 ,p_3 , \ldots ,p_t } \right\}\) which contains t essential participants and \(R = \left\{ {p_{t + 1} ,p_{t + 2} , \ldots ,p_n } \right\}\) which contains \((n - t)\) remaining participants. For a \((t,k,n)\)-EVCS the minimal qualified set is represented as ΓQM = {A: A \(\subseteq\) P, L ∈ A and \(\left| A \right|\) = k}. It is mandatory that all the participants in the set L and any k participants from set R need to involve in the reconstruction phase of \((t,k,n)\)-EVCS.
In today’s world, there is a need for storing user’s valuable private data like texts, images, passwords, or keys, on his/her computer or on any other electronic device. But in the current computing world all devices can fall prey to viruses, spyware, Trojan horses and other types of malware, exposing user data and breaching his/her privacy. Under such circumstances, it becomes paramount for a user or company to ensure the confidentiality of his/her data. One of the applications of essential access structure (1, k, n)-VCS in this scenario is that, user can store copies of the essential share in each of his/her own devices (home computer, mobile phones etc.) and outsource the remaining \(n - 1\) shares to \(n - 1\) trusted servers. So, an event of corruption or loss of his/her own single device will not result in the loss of data. Even on compromise of \(k - 1\) servers, it will not expose the private information of user to public. A (1, k, n) scheme is a (t, k, n) scheme where the value of t is 1. Figure 1 shows the experimental results and implies that our scheme has better contrast than Ateniese et al. [13] scheme. The following section shows our proposed algorithm for share generation and secret reconstruction for (t, k, n)-EVCS.
2.1 Share Generation and Distribution Phase
Input:
-
1.
SI and a random image K of size \(p \times q\).
-
2.
The t cover images \(COV_{(p_r ,1)}\) of size \(p \times q\), where \(p_r \in L\), \(1 \le r \le t\).
(\(COV_{(p_r ,1)}\), used for generating meaningful shares for t mandatory participants in L).
-
3.
The \((n - t) \times m\) cover images \(COV_{(p_u ,j)}\) of size \(p \times q\), where \(p_u \in R\), \((t + 1) \le u \le n\).
(\(COV_{(p_u ,j)}\), used for generating meaningful shares for remaining \((n - t)\) participants where \(1 \le j \le m\), pixel expansion of a perfect black \((k - t,n - t)\) scheme is m).
-
4.
S0 and S1 are basis matrices of a perfect black \((k - t,n - t)\)-VCS of size \((n - t) \times m\).
-
5.
Let Odd (resp. Even) be column vectors of size \((t \times 1)\) which contain odd (resp. even) number of ones.
-
6.
Set Mp (Mp contains any one essential participant, \(\left| {Mp} \right| = 1\)).
Output:
-
1.
Shares {\(Sh_{(p_r ,1)}\):\(1 \le r \le t\)}. The t meaningful shares of size \(p \times 4q\) are distributed to t mandatory participants in set L.
-
2.
Shares {\(Sh_{(p_u ,j)}\):\((t + 1) \le u \le n\),\(1 \le j \le m\)}. The \((n - t) \times m\) meaningful shares of size \(p \times 4q\) are distributed to remaining participants in set R.
-
3.
Share MS of size \(p \times 4q\) is distributed to participants in the set Mp.
2.2 Secret Reconstruction Phase
-
Step 1. \(\lambda_j\)’s are generated by OR-ing shares \(Sh_{(p_u ,j)}\) of any \((k - t)\) out of \((n - t)\) participants in \(R = \left\{ {p_{t + 1} ,p_{t + 2} ,\begin{array}{*{20}c} {} \\ \end{array} ....,p_n } \right\}\), where \(1 \le j \le m\).
-
Step 2.
-
The construction of K can be done using any one of the following schemes
-
a) Cimato et al. [5] (OR and NOT operation) b) Wang et al. [6] (OR and XOR operation) and c) Praveen et al. [7] (OR and AND operation).
-
Step 3. XOR-ing the shares of all the participants in the set L along with K will generate RI. Then AND-ing RI with MS will reconstruct the secret OI.
Tables 2, 3 and 4 shows the comparison results.
2.3 Analysis on the Pixel Expansion, Contrast and Security
The matrices S0 (resp. S1) are constructed based on the Definition 1. The proposed (t, k, n)-perfect black EVCS is valid only when the following three conditions meet.
Condition 1:
It should not be possible for any (k − t) participant in the set R out of (n − t) participants to identify SI in the absence of participants in the set L.
Condition 2:
It should not be possible for any participant less than (k − t) in the set R out of (n − t) participants to identify SI with participants in the set L.
Condition 3:
It should be possible for any (k − t) in the set R out of (n − t) participants to identify SI in the presence of all participants in the set L. The first two conditions are for the security of the scheme and the third is for the correctness of reconstruction. Assume that variables q, b, b1, b2, z take the values either 0 or 1. Let \(Pbr(q = b)\) denote the probability of occurrence of q equal to b. Let b1 and b2 be the two independent bits and \(q = b_1 \oplus b_2\). Let \(Pbr\left( {{{\left( {q = b_2 } \right)} / {\left( {b_1 = z} \right)}}} \right)\) be the probability of \(q = b_2\) given bit b1 equal to z.
Lemma 1:
Let b1 (resp. b2) be known (resp. unknown) bit and \(q = b_1 \oplus b_2\) then
Proof:
Here the given information is b1 and \(q = b_1 \oplus b_2\). But b2 is unknown then,
\(Pbr\left( {{{\left( {q = 0} \right)} / {\left( {b_1 = 0} \right)}}} \right) = Pbr\left( {{{\left( {q = 1} \right)} / {\left( {b_1 = 0} \right)}}} \right) = \frac{1}{2}\) and \(Pbr\left( {{{\left( {q = 0} \right)} / {\left( {b_1 = 1} \right)}}} \right) = Pbr\left( {{{\left( {q = 1} \right)} / {\left( {b_1 = 1} \right)}}} \right) = \frac{1}{2}\) accordingly,\(Pbr\left( {{{\left( {q = b_2 } \right)} / {\left( {b_1 = 0} \right)}}} \right) = Pbr\left( {{{\left( {q = b_2 } \right)} / {\left( {b_1 = 1} \right)}}} \right) = \frac{1}{2}\).
Lemma 2:
Given two bits b1, b2 and \(q = b_1 \oplus b_2\) then \(Pbr\left( {{{\left( {q = b_2 } \right)} / {\left( {b_1 = 0} \right)}}} \right) = 1\) and \(Pbr\left( {{{\left( {q = b_2 } \right)} / {\left( {b_1 = 1} \right)}}} \right) = 0\).
Proof:
Here the given information is b1, b2 and \(q = b_1 \oplus b_2\) then, \(Pbr\left( {{{\left( {q = 0} \right)} / {\left( {b_1 = 0} \right)}}} \right) = Pbr\left( {{{\left( {q = 1} \right)} / {\left( {b_1 = 0} \right)}}} \right) = 1\) and
\(Pbr\left( {{{\left( {q = 0} \right)} / {\left( {b_1 = 1} \right)}}} \right) = Pbr\left( {{{\left( {q = 1} \right)} / {\left( {b_1 = 1} \right)}}} \right) = 0\) accordingly, \(Pbr\left( {{{\left( {q = b_2 } \right)} / {\left( {b_1 = 0} \right)}}} \right) = 1\) and \(Pbr\left( {{{\left( {q = f(b_2 )} \right)} / {\left( {b_1 = 1} \right)}}} \right) = 1\).
which implies that \(Pbr\left( {{{\left( {q = b_2 } \right)} / {\left( {b_1 = 1} \right)}}} \right) = 0\).
Let x be a bit obtained by combining the shares (MS is not taken) of any \((k - t)\) out of \((n - t)\) participants from the set R. Let y be a bit obtained by combining all the shares of participants in the set Land s is the secret bit in RI. Then \(s = x \oplus y\).The security for Condition 1 and 2 can be proved using Lemma 1.
Condition 1:
Here \(b_1 = y\) (is given), \(b_2 = x\) (is unknown bit either 0 or 1) and \(q = s\) (either 0 or 1). \(Pbr\left( {{{\left( {s = x} \right)} / {\left( {y = 0} \right)}}} \right) = Pbr\left( {{{\left( {s = x} \right)} / {\left( {y = 1} \right)}}} \right) = \frac{1}{2}\) (Lemma 1).
Condition 2:
Here \(b_1 = x\) (is given), \(b_2 = y\) (is unknown bit either 0 or 1) and q = s (either 0 or 1). \(Pbr\left( {{{\left( {s = y} \right)} / {\left( {x = 0} \right)}}} \right) = Pbr\left( {{{\left( {s = y} \right)} / {\left( {x = 1} \right)}}} \right) = \frac{1}{2}\) (Lemma 1).
Condition 3:
Here \(b_1 = y\), \(b_2 = x\) (is given) and \(q = s\). \(Pbr\left( {{{\left( {s = x} \right)} / {\left( {y = 0} \right)}}} \right) = 1\), \(Pbr\left( {{{\left( {s = x} \right)} / {\left( {y = 1} \right)}}} \right) = 0\) (Lemma 2).
Figure 2 shows the experimental results of our scheme with meaningful shares (Sh) and reconstructed images (RI and OI). Figure 3 shows the experimental results of Ateniese et al. [13] scheme with meaningful shares (Sh) and reconstructed images (AI). It is clear that the contrast of AI is less than OI.
3 Conclusion
Even though deterministic schemes need huge amount of data, it guarantees reconstruction of all the secret data correctly. In the case of probabilistic scheme there is no such guarantee. So constructions of deterministic schemes with high relative contrast and less pixel expansion are of great demand. In this paper a deterministic EVCS for (t, k, n) access structure is proposed. It is true that in our constructions OR, XOR and AND Boolean operations are used for reconstruction instead of only OR operation as in existing EVCS constructions. But the experimental results show that, the quality of reconstructed image for our EVCS is better when compared to other related EVCS.
References
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) Eurocrypt 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1994). https://doi.org/10.1007/BFb0053419
Adhikari, A.: Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images. Des. Codes Cryptogr. 73(3), 865–895 (2014)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)
Blundo, C., De Bonis, A., De Santis, A.: Improved schemes for visual cryptography. Des. Codes Cryptogr. 24(3), 255–278 (2001)
Cimato, S., De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93(4), 199–206 (2005)
Wang, D.S., Song, T., Dong, L., Yang, C.N.: Optimal contrast grayscale visual cryptography schemes with reversing. IEEE Trans. Inf. Forensics Secur. 8(12), 2059–2072 (2013)
Praveen, K., Sethumadhavan, M.: Ideal contrast visual cryptography for general access structures with AND operation. In: Nagar, A., Mohapatra, D.P., Chaki, N. (eds.) Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. SIST, vol. 44, pp. 309–314. Springer, New Delhi (2016). https://doi.org/10.1007/978-81-322-2529-4_32
Arumugam, S., Lakshmanan, R., Nagar, A.K.: On (k, n) *-visual cryptographic scheme. Des. Codes Cryptogr. 71(1), 153–162 (2014)
Guo, T., Liu, F., Wu, C.K., Ren, Y.W., Wang, W.: On (k, n) visual cryptography scheme with t essential parties. In: Padró, C. (ed.) ICITS 2013. LNCS, vol. 8317, pp. 56–68. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-04268-8_4
Dutta, S., Rohit, R.S., Adhikari, A.: Constructions and analysis of some efficient t-(k, n)* - visual cryptographic schemes using linear algebraic techniques. Des. Codes Cryptogr. 1–32 (2016)
Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481–494 (2004)
Liu, F., Wu, C., Lin, X.: Step construction of visual cryptographic schemes. IEEE Trans. Inf. Forensics Secur. 5(1), 25–34 (2010)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1), 143–161 (2001)
Liu, F., Wu, C.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307–322 (2011)
Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)
Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography with error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383–396 (2009)
Wang, D., Yi, F., Li, X.: On general construction for extended visual cryptography schemes. Pattern Recogn. 42(11), 3071–3082 (2009)
Yang, C.N., Yang, Y.Y.: New extended visual cryptography schemes with clearer shadow images. Inf. Sci. 271, 246–263 (2014)
Yan, X., Wang, S., Niu, X., Yang, C.N.: Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Digit. Sig. Process. 38, 53–65 (2015)
Lu, S., Manchala, D., Ostrovsky, R.: Visual cryptography on graphs. J. Comb. Optim. 21(1), 47–66 (2011)
Lee, K.H., Chiu, P.L.: An extended visual cryptography algorithm for general access structures. IEEE Trans. Inf. Forensics Secur. 7(1), 219–229 (2012)
Guo, T., Liu, F., Wu, C.: k out of k extended visual cryptography scheme by random grids. Sig. Process. 94, 90–101 (2014)
Chiu, P.L., Lee, K.H.: User-friendly threshold visual cryptography with complementary cover images. Sig. Process. 108, 476–488 (2015)
Ou, D., Sun, W., Wu, X.: Non-expansible XOR-based visual cryptography scheme with meaningful shares. Sig. Process. 108, 604–621 (2015)
Yan, X., Wang, S., Niu, X., Yang, C.N.: Generalized random grids-based threshold visual cryptography with meaningful shares. Sig. Process. 109, 317–333 (2015)
Wang, S., Yan, X., Sang, J., Niu, X.: Meaningful visual secret sharing based on error diffusion and random grids. Multimedia Tools Appl. 75(6), 3353–3373 (2016)
Praveen, K., Sethumadhavan, M., Krishnan, R.: Visual cryptographic schemes using combined Boolean operations. J. Discrete Math. Sci. Cryptogr. 20(2), 413–437 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Chandana Priya, L., Praveen, K. (2021). (t, k, n)-Deterministic Extended Visual Secret Sharing Scheme Using Combined Boolean Operations. In: Venugopal, K.R., Shenoy, P.D., Buyya, R., Patnaik, L.M., Iyengar, S.S. (eds) Data Science and Computational Intelligence. ICInPro 2021. Communications in Computer and Information Science, vol 1483. Springer, Cham. https://doi.org/10.1007/978-3-030-91244-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-91244-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-91243-7
Online ISBN: 978-3-030-91244-4
eBook Packages: Computer ScienceComputer Science (R0)