Abstract
Visual cryptography is a cryptographic technique which enhances the security of the image and uses the characteristics of human vision to decrypt encrypted images. Halftone Visual Cryptography uses halftoning techniques for converting the color image into binary images. The problem of encoding color image into n shares of meaningful halftone images is considered in this paper. The halftone techniques used are Error Diffusion and Direct Binary Search. Using these techniques, a secret pixel of a color image can be encoded into shares. These two techniques are compared on the basis of Peak to Signal Noise ratio (PSNR), Correlation, Universal Quality Index (UQI) and Structural Similarity (SSIM).
Access provided by Autonomous University of Puebla. Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
With the rapid development and increased need of computer and communication technology, more secret information are transmitted through the Internet. Therefore, protecting the secret information from being suspected and decrypted has become critical task. In 1994, a new information security technique called Visual Cryptography (VC) [1] was invented. VC is a cryptographic scheme in which decrypting of hidden images is done using human eyes. No previous knowledge of cryptography or computation is required for decoding which is the advantage of using in this technique along with high security offered using this technique. Visual cryptography scheme (VCS) [2] is a scheme which allows the encryption of a secret image into n shares that is given to n participants. These n participants are called the qualified shares. VC works on binary image only. Images are not only monochrome format but in grayscale and color. For converting a grayscale [3] and a color image to binary image, halftoning techniques are applied. Commonly used halftone techniques for color image encryption are Error diffusion and Direct Binary Search (DBS) which is implemented in this paper.
To explain the basic principle of VC, consider a (k, n) VC scheme which encrypts a secret image into n shares to be distributed among n participants. Each share shows a random noise pattern of black and white and doesn’t disclose any information on the secret image by itself. In a (k, n) VCS, k is the minimum qualifying participants required to decode the secret image. Fewer participants that is k-1 will be forbidden which will not decode the secret image even if infinite computational power is available. Qualifying share will be stacking/superimposed to decrypt the secret image. Researches have developed several methods for VC in literature. An optimal contrast k, n VCS was proposed to analyze the contrast of the reconstructed image for a (k, n)-threshold VCS [4]. Blundo [5] developed VCS with general structure for grayscale images. To generate a halftone share, Hou [6] transformed a gray level image into halftone images and then applied to VC. Extended visual cryptography (EVC) was developed by Ateniese [7] in which shares carry not only secret image information but meaningful images also. Meaningful images have a higher security rather than random noise shares. Hypergraphy color is used in constructing meaningful binary shares. Image quality was improved by Nakajima [8] by extended EVC with natural grayscale images. Halftone methods are used to generate good quality halftone shares in VC [9]. Meaningful Halftone image using threshold array was proposed in [10]. Meaningful images using error diffusion [11] was developed for producing halftone shares. Color Extended Visual Cryptography using error diffusion was developed by Inkoo [12] and Halftone visual cryptography using Direct Binary Search (DBS) [13].
In the above mentioned methods, the shares that are produced have low visibilities. The different types of halftoning methods are point process, neighborhood process and iterative process. Neighborhood processing (Error Diffusion) and iterative process (DBS) of halftoning are implemented and compared. Halftone is applied on both the secret images and cover images.
2 Methodolgy
Encryption In this paper, encryption for a (2, 2) VC scheme is done using EVC using halftoning techniques for color images. A secret image of size m \( \times \) m is taken and halftone is applied. The methods implemented for halftoning are Error diffusion or DBS. In Error diffusion halftoning, the quantization error is distributed to the nearby pixels which are unprocessed. Also the Visual information pixels position is retained. Whereas, in DBS which is a iterative search, a binary image is taken and a template is saved. It is then processed depending on the given iterative value. Each time when the process gets completed, error is calculated and the least error found is selected as a DBS halftoned share. Share images taken for producing meaningful share of size n \(\times \) n has to be double in size in comparison with the secret image. Here also halftone techniques are applied in the same manner as explained above to get two meaningful halftone shares. Encrypted share 1 and share 2 is now generated which carries both secret information and meaningful images. Now the share is ready to be given to the as qualified shares to the participant.
Decryption The qualified participant on stacking/superimposing will recover the original secret image. The stacking/superimposing is executed using the \( \otimes \) the ‘OR’ boolean function.
DBS uses the minimum perceived error obtained by searching for the best possible binary value in the halftone image iterations. This gives DBS much better halftone image quality than error diffusion. This is further verified using various parameters. The parameter metrics used for analyzing the encrypted shares with the original halftoned share are PSNR, Correlation UQI and SSIM. PSNR is a measure to find of quality of recovered images and actual image. Correlation extracts the information of a image, then the encrypted share is compared with the halftoned image. UQI [14] is the ability to measure the information loss occurred during the image degradation process and SSIM [15] measures the similarity between reconstructed images and original image. By considering more parametric measures, a better understanding of the quality of the desired image can be achieved.
3 Result and Discussion
In this section, a 2-out of-2 Halftone VC is constructed using error diffusion and DBS. The secret image to be encoded is Lena. Two color images Earth and Baboon are taken as meaningful images. The size of the share is 256 \(\times \) 256 and the size of the secret image is 128 \(\times \) 128.
In Fig. 1, Fig. 1a is the original secret image which has to be encoded. Figure 1c and d are original cover images. Figure 1b, d, f are halftoned images using error diffusion. Encrypted shares generated are shown in Fig. 1g and h. Figure 1i shows the reconstructed image when encrypted shares 1 and 2 are stacked together using OR operation.
In Fig. 2, Fig. 2a is the original secret image which has to be encoded. Figure 2c and d are original cover images. Figure 2b, d, f are halftoned image using DBS. Encrypted shares generated are shown in Fig. 2g and h. Figure 2i shows the reconstructed image when encrypted shares 1 and 2 are stacked.
Table 1 shows PSNR, Correlation, UQI and SSIM of Encrypted Share 1 for 10 color secret images. The average value using Error Diffusion of PSNR is 51.41, Correlation is 0.3105, UQI is 0.1315 and SSIM is 0.0408. Using DBS, the average value of PSNR is 51.646, Correlation is 0.3027, UQI is 0.1331 and SSIM is 0.0843.
Table 2 shows PSNR, Correlation, UQI and SSIM of Encrypted Share 2 for 10 color secret images. The average value using Error Diffusion of PSNR is 51.291, Correlation is 0.2609, UQI is 0.0693 and SSIM is 0.0398. Using DBS, the average value of PSNR is 51.482, Correlation is 0.2788, UQI is 0.1066 and SSIM is 0.0647.
4 Conclusion
Visual Cryptography provides one of the secure ways to transfer images on the Internet. Images in color have been encoded and decoded using both Error diffusion and Direct Binary Search. Various parameters have been taken like PSNR, Correlation, UQI and SSIM. The proposed UQI model performs well without any Human Visual System model. Also algorithm supports not only monochrome images but grayscale and color images, even pixel expansion have been minimized. Correlation value is decreased in Encrypted share 1 but in the case of share 2, all the parameter measured value of DBS is better than Error Diffusion. The percentage of variation in PSNR, Correlation and UQI among these two methods is very small whereas improvement in SSIM is 50 percent in case of DBS. Visually also direct binary search gives us better results than Error Diffusion.
References
Naor M, Shamir A (1994) Visual cryptography. In: Proceedings of the EUROCRYPT, pp 1–12
Sandhya T, Saylee G (2017) Review on various cryptography schemes. In: International conference on current trends in computer, electrical, electronics and communication (ICCTCEEC), pp 360–363
Sandhya T, Saylee G (2018) Halftone visual cryptography for grayscale images using error diffusion and direct binary search. In: Proceedings of the 2nd international conference on trends in electronics and informatics (ICOEI) IEEE conference, pp 1091–1096
Blundo C, DArco P, De Santis A, Stinson DR (2003) Contrast optimal threshold visual cryptography schemes. SIAM J Discret Math 16, 224–261
Blundo C, Santis AD, Naor M (2000) Visual cryptography for grey level images. Inf Process Lett 75:255–259
Hou YC (2003) Visual cryptography for color images. Pattern Recognit 36:1619–1629
Ateniese G, Blundo C, Santis A, Stinson DR (2001) Extended capabilities for visual cryptography. ACM Theor Comput Sci 250:143–161
Nakajima M, Yamaguchi Y (2002) Extended visual cryptography for natural images. J WSCG 10
Zhou Z, Arce GR, Crescenzo GD (2006) Halftone visual cryptography. IEEE Trans Image Process 18:2441–2453
Myodo E, Sakazawa S, Takishima Y (2006) Visual cryptography based on void-and-cluster halftoning technique. In: IEEE international conference on image processing, pp 97–100
Wang ZM, Arce GR, Di Crescenzo G (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensics Secur 4:383–396
Kang I, Arce GR, Lee HK (2011) Color extended visual cryptography using error diffusion. IEEE Trans Image Process 20
Wang ZM, Arce GR, Di Crescenzo G (2006) Halftone visual cryptography via direct binary search. In: EUSIPCO
Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Thomas, S.A., Gharge, S. (2020). Halftone Visual Cryptography for Color Images Using Error Diffusion and Direct Binary Search. In: Kadambi, G., Kumar, P., Palade, V. (eds) Emerging Trends in Photonics, Signal Processing and Communication Engineering. Lecture Notes in Electrical Engineering, vol 649. Springer, Singapore. https://doi.org/10.1007/978-981-15-3477-5_13
Download citation
DOI: https://doi.org/10.1007/978-981-15-3477-5_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3476-8
Online ISBN: 978-981-15-3477-5
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)