تعداد نشریات | 31 |
تعداد شمارهها | 700 |
تعداد مقالات | 6,843 |
تعداد مشاهده مقاله | 11,201,434 |
تعداد دریافت فایل اصل مقاله | 7,514,404 |
High-quality Visual Cryptography of Real-value Images without Pixel Expansion using Fuzzy Random Grids | ||
Iranian Journal of Fuzzy Systems | ||
دوره 20، شماره 6، بهمن و اسفند 2023، صفحه 21-47 اصل مقاله (7.26 M) | ||
نوع مقاله: Research Paper | ||
شناسه دیجیتال (DOI): 10.22111/ijfs.2023.43474.7640 | ||
نویسندگان | ||
Mostafa Mokhtari Ardakan1؛ Reza Ramezani* 1؛ Ali Mohammad Latif2 | ||
1Department of Computer Engineering, University of Isfahan, Isfahan, Iran. | ||
2Department of Computer Engineering, Yazd University, Yazd, Iran. | ||
چکیده | ||
Visual cryptography is a method used to secure images by converting them into several shares that are finally stacked to recover the original image without any calculations. Most existing techniques that can encrypt gray and color images often convert them to binary or support only limited colors, which results in reducing the quality of recovered images. Pixel expansion is another problem with existing methods. Thus, a new approach is required to encrypt gray and color images with real value, without converting them to binary or limited-color images, and also without imposing any pixel expansions. Besides, generated shares should have security, and the recovered images should be of high quality. In this research, fuzzy random grids and a meta-heuristic algorithm are used for the share generation in the encryption step. Next, the decryption step uses the fuzzy OR operator to recover high-quality images. The evaluation results demonstrate the ability of the proposed solution in encrypting gray and color images without converting them to binary, and also without pixel expansion. Besides, the results show that the proposed method is secure as individual shares do not show any information from the original image. The quality of the decrypted images has also been evaluated using subjective and objective evaluation metrics, which prove the high quality of recovered images. | ||
کلیدواژهها | ||
Visual cryptography؛ pixel expansion؛ fuzzy random grid؛ fuzzy OR؛ visual quality | ||
مراجع | ||
[1] F. M. Aswad, I. Salman, S. A. Mostafa, An optimization of color halftone visual cryptography scheme based on Bat algorithm, Journal of Intelligent Systems, 30(1) (2021), 816-835. [2] H. Ayad, M. Khalil, Qam-dwt-svd based watermarking scheme for medical images, International Journal of Interac- tive Multimedia and Arti cial Intelligence, (2018), 81-89. [3] C. S. Baird, Absorption of electromagnetic radiation, AccessScience, 2019.
[4] J. Blesswin, M. Kumar, Secured communication method using visual secret sharing scheme for color images, Journal of Internet Technology, 22(4) (2021), 803-810. [5] C. Blundo, S. Cimato, A. De Santis, Visual cryptography schemes with optimal pixel expansion, Theoretical Com- puter Science, 369(1-3) (2006), 169-182. [6] N. Buckley, A. K. Nagar, S. Arumugam, On real-valued visual cryptographic basis matrices, Journal of Universal Computer Science, 21(12) (2015), 1536-1562. [7] B. Champagne, M. Guillaume, F. Zutterman, TDDFT investigation of the optical properties of cyanine dyes, Chem- ical Physics Letters, 425(1-3) (2006), 105-109. [8] J. Chandrasekaran, Chemistry of colours, Resonance, 6(3) (2001), 66-75.
[9] J. J. Chang, B. Y. Huang, J. S. Juan, A new visual multi-secrets sharing scheme by random grids, Cryptography, 2(3) (2018), 24. [10] H. C. Chao, T. Y. Fan, Random-grid based progressive visual secret sharing scheme with adaptive priority, Digital Signal Processing, 68 (2017), 69-80. [11] H. C. Chao, T. Y. Fan, XOR-based progressive visual secret sharing using generalized random grids, Displays, 49 (2017), 6-15. [12] H. C. Chao, T. Y. Fan, Generating random grid-based visual secret sharing with multi-level encoding, Signal Processing: Image Communication, 57 (2017), 60-67. [13] T. H. Chen, Y. S. Lee, C. H. Lin, On the diculty of aligning VSS random grids, Signal Processing: Image Communication, 44 (2016), 101-107. [14] P. L. Chiu, K. H. Lee, Ecient constructions for progressive visual cryptography with meaningful shares, Signal Processing, 165 (2019), 233-249. [15] S. Cimato, R. De Prisco, A. De Santis, Probabilistic visual cryptography schemes, The Computer Journal, 49(1) (2006), 97-107. [16] S. Cimato, R. De Prisco, A. De Santis, Colored visual cryptography without color darkening, Theoretical Computer Science, 374(1-3) (2007), 261-276. [17] M. A. Duraisamy, M. M. Sathiyamoorthy, M. S. Chandrasekar, Protection of privacy in visual cryptography scheme using error di usion technique, International Journal of Computer Science and Network, 2(2) (2013). [18] P. A. Eisen, D. R. Stinson, Threshold visual cryptography schemes with speci ed whiteness levels of reconstructed pixels, Designs, Codes and Cryptography, 25(1) (2002), 15-61. [19] R. Franzen, Kodak lossless true color image suite, http : / / r0k . us / graphics / kodak. (accessed:08.30.2023). [20] A. Giri, Development of digital half toning techniques for Grayscale image, PhD thesis, 2014. [21] M. Gupta, et al., An ecient image encryption technique based on two-level security for internet of things, Multi- media Tools and Applications, 82(4) (2023), 5091-5111. [22] C. Hegde, et al., Secure authentication using image processing and visual cryptography for banking applications, 2008 16th International Conference on Advanced Computing and Communications, (2008), 65-72. [23] A. Hore, D. Ziou, Image quality metrics: PSNR vs. SSIM, 2010 20th International Conference on Pattern Recog- nition, (2010), 2366-2369. [24] Y. C. Hou, Visual cryptography for color images, Pattern Recognition, 36(7) (2003), 1619-1629.
[25] H. Hu, et al., General construction for XOR-based visual cryptography and its extended capability, Multimedia Tools and Applications, 75 (2016), 13883-13911. [26] B. Hu, et al., Subjective and objective quality assessment for image restoration: A critical survey, Signal Processing: Image Communication, 85 (2020), 115839. [27] O. Kafri, E. Keren, Encryption of pictures and shapes by random grids, Optics Letters, 12(6) (1987), 377-379. [28] Y. Kang, et al., Visual cryptography based on ghost imaging and Hadamard transform, Quantum Information Processing, 22(2) (2023), 116. [29] S. Kumar, R. Sharma, Improving contrast in random grids based visual secret sharing, International Journal of Security and Its Applications, 6(1) (2012), 9-28. [30] P. Li, et al., A construction method of (2, 3) visual cryptography scheme, IEEE Access, 8 (2020), 32840-32849. [31] C. C. Lin, W. H. Tsai, Visual cryptography for gray-level images by dithering techniques, Pattern Recognition Letters, 24(1-3) (2003), 349-358. [32] Z. Liu, et al., Weighted visual secret sharing for general access structures based on random grids, Signal Processing: Image Communication, 92 (2021), 116129. [33] N. A. E. S. Mohamed, A. Youssif, H. A. G. El-Sayed, Fast and robust image encryption scheme based on quantum logistic map and hyperchaotic system, Complexity, 2022 (2022). DOI: 10.1155/2022/3676265. [34] P. Mohammadi, A. Ebrahimi Moghadam, S. Shirani, Subjective and objective quality assessment of image: A survey, arXiv preprint arXiv:1406.7799, (2014). [35] M. Naor, A. Shamir, Visual cryptography, Advances in Cryptology{EUROCRYPT'94: Workshop on the Theory and Application of Cryptographic Techniques Perugia, Italy, May 9{12, 1994 Proceedings 13. Springer, (1995), 1-12. [36] J. S. Pan, et al., Visual cryptography scheme for secret color images with color QR codes, Journal of Visual Communication and Image Representation, 82 (2022), 103405. [37] C. S. Sanaboina, S. R. Odugu, G. Vanamadi, Secret image sharing using visual cryptography shares with acknowl- edgment, International Journal of Innovative Technology and Exploring Engineering, 8(11) (2019), 3474-3481. [38] U. Sara, M. Akter, M. S. Uddin, Image quality assessment through FSIM, SSIM, MSE and PSNR{a comparative study, Journal of Computer and Communications, 7(3) (2019), 8-18. [39] D. R. I. M. Setiadi, PSNR vs SSIM: Imperceptibility quality assessment for image steganography, Multimedia Tools and Applications, 80(6) (2021), 8423-8444. [40] G. Shen, et al., Perfect contrast XOR-based visual cryptography schemes via linear algebra, Designs, Codes and Cryptography, 85 (2017), 15-37. [41] H. Shi, et al., A robust and secure zero-watermarking copyright authentication scheme based on visual cryptography and block GH feature, Multimedia Tools and Applications, 81(26) (2022), 38019-38051. [42] S. J. Shyu, Image encryption by random grids, Pattern Recognition, 40(3) (2007), 1014-1031.
[43] S. J. Shyu, Image encryption by multiple random grids, Pattern Recognition, 42(7) (2009), 1582-1596.
[44] S. J. Shyu, M. C. Chen, Minimizing pixel expansion in visual cryptographic scheme for general access structures, IEEE Transactions on Circuits and Systems for Video Technology, 25(9) (2015), 1557-1561. [45] P. Singh, B. Raman, Reversible data hiding based on Shamir's secret sharing for color images over cloud, Informa- tion Sciences, 422 (2018), 77-97. [46] USC University of Southern California. The USC-SIPI Image Database. url: http://sipi.usc.edu/database. (ac- cessed: 08.30.2023). [47] Z. Wang, et al., Image quality assessment: From error visibility to structural similarity, IEEE Transactions on Image Processing, 13(4) (2004), 600-612. [48] Z. Wang, G. R. Arce, G. Di Crescenzo, Halftone visual cryptography via error di usion, IEEE Transactions on Information Forensics and Security, 4(3) (2009), 383-396. [49] D. S. Wang, et al., Optimal contrast grayscale visual cryptography schemes with reversing, IEEE Transactions on Information Forensics and Security, 8(12) (2013), 2059-2072. [50] D. S. Wang, F. Yi, X. Li, Probabilistic visual secret sharing schemes for grey-scale images and color images, Information Sciences, 181(11) (2011), 2189-2208. [51] G. Wei, Some similarity measures for picture fuzzy sets and their applications, Iranian Journal of Fuzzy Systems, 15(1) (2018), 77-89. [52] X. Wu, Z. R. Lai, Random grid based color visual cryptography scheme for black and white secret images with general access structures, Signal Processing: Image Communication, 75 (2019), 100-110. [53] X. Wu, W. Sun, Improving the visual quality of random grid-based visual secret sharing, Signal Processing, 93(5) (2013), 977-995. [54] X. Wu, W. Sun, Extended capabilities for XOR-based visual cryptography, IEEE Transactions on Information Forensics and Security, 9(10) (2014), 1592-1605. [55] X. Wu, C. N. Yang, Invertible secret image sharing with steganography and authentication for AMBTC compressed images, Signal Processing: Image Communication, 78 (2019), 437-447. [56] X. Wu, C. N. Yang, Probabilistic color visual cryptography schemes for black and white secret images, Journal of Visual Communication and Image Representation, 70 (2020), 102793. [57] C. N. Yang, New visual secret sharing schemes using probabilistic method, Pattern Recognition Letters, 25(4) (2004), 481-494. [58] C. N. Yang, T. S. Chen, Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion, Pattern Recognition Letters, 26(2) (2005), 193-206. [59] C. N. Yang, C. C. Wang, T. S. Chen, Visual cryptography schemes with reversing, The Computer Journal, 51(6) (2008), 710-722. [60] C. N. Yang, Y. Y. Yang, On the analysis and design of visual cryptography with error correcting capability, IEEE Transactions on Circuits and Systems for Video Technology, 31(6) (2020), 2465-2479. [61] L. A. Zadeh, Fuzzy sets, Information and Control, 8(3) (1965), 338-353.
[62] D. Zhang, et al., HP-VCS: A high-quality and printer-friendly visual cryptography scheme, Journal of Visual Communication and Image Representation, 78 (2021), 103186. | ||
آمار تعداد مشاهده مقاله: 369 تعداد دریافت فایل اصل مقاله: 511 |