Literature Review
Literature Review
CHAPTER 2
LITERATURE REVIEW
Naor and Shamir [1] formally defined and put forward the visual cryptography scheme
for secret sharing. Since then research on the VC has flourished to become a subject to various
research directions. There are many types of VC and each of these schemes has its own emphasis
on application in practice. The operation of dividing a VC secret image into shares has been
focused on the areas of being applied to different types of the secret such as grayscale and color
images. In this chapter initially, basic knowledge of secret sharing and VC has been introduced
to address the previous achievements. Several contributions to the literature have been discussed
according to different variants of VC scheme suggested in the literature.
Secret sharing schemes are useful in many situations that require the availability of
several chosen people such as launching a missile or entering an area of restricted access (e.g., a
bank locker). Assuming, the situation that a locker in a bank that must be opened every day. This
problem can be easily solved using a secret sharing scheme. A system whereby any two of the
three senior officers can gain access to the vault, but no individual person can do so. In a more
generalized situation, one may specify exactly which subsets of the employee should be allowed.
A secret sharing scheme is basically a technique of dividing a secret message into two or
more numbers of pieces, and these pieces of information are called shares. A combiner process is
responsible for the recovery of the secret information from an allowed predefined subset of
shares. Thus, no single share is of any threat to the confidentiality of the secret information. As
the original information can be destroyed forever this would mean that even the person
responsible for the process will not be a threat.
Assume a scenario where a company has a computing machine that contains some crucial
and sensitive financial data. To make it secure, the management of an organization can set a
robust password for the machine and then encode this secret password into n many shares and
distribute these shares among the people. Sharing the secret in such a way satisfies the conditions
of secrecy and correctness both.
Shamir’s scheme [30] based on the idea that a unique polynomial of degree can be
fitted to any set of points that lie on the polynomial. Usually points would be required to
determine it.[42] To follow Shamir’s method the organization has to create a polynomial of
degree at most with the secret as the constant term. Next points are to be chosen on the
curve. Each of the authorized person gets one point on the curve. When at least out of the
person reveal their points, the constant term in the fitted polynomial being the secret password.
The Blakeley’s scheme [41] relies on the fact that any nonparallel dimensional
Literature Review 3
hyperplanes intersect at a specific point which is the secret. Ito, Saito, and Nishizeki [43]
suggested a more general method based on access structure. It is based on a specification of all
subsets of participants who can recover the secret Ito [44] gave a methodology to realize secret
sharing schemes for arbitrary monotone access structures. Subsequently, Benaloh and Leichter
[45] suggested more efficient way for perceiving such schemes.
The size of the shares distributed among different participants is a major point in the
design of any secret sharing schemes. Unfortunately, in all secret sharing schemes, the size of the
shares cannot be less than the size of the secret. A scheme which has information rate equal to
one is called an ideal scheme. In most of the schemes, when a large number of participants are
involved, the scheme becomes impractical. There is a close relationship between combinatorial
structures and secret sharing. For example, a (2, 3) threshold scheme can be implemented based
on a small Latin square. In the traditional method of secret sharing schemes, a shared secret
information cannot be revealed without any cryptographic computations. In 1994, Naor and
Shamir invented a visual cryptography scheme which decrypts without cryptographic
computation.
The most general type of VCS deals with the situation when the allowed subsets of
participants handpicked from the set of participants . This type of visual cryptographic scheme
Literature Review 4
is known as the VCS for general access structure [46]. One particular case, known as a -
threshold VCS, takes care of the scenario where any allowed set of participants is a subset of
i.e. such that the cardinality of is at least . In this case, any qualified subset of or
more participants can visually recover the secret image, whereas forbidden sets of participants
consisting of or less number of participants have no information on the secret image. The
main difference between a traditional threshold scheme and a visual threshold scheme lies in the
process of secret recovery. A traditional threshold scheme typically involves computations in a
finite field; while in a visual threshold scheme, the computation is performed by the human visual
system [47]. Typically, in (k,n)-VCS, the decryption process cannot be successful unless at least k
pieces are collected and superimposed [48]. The pixel value ‘1’ and ‘0’ represents black and white
pixel respectively. The common basic terminologies used in VC are as follows:
Grayscale digital image – A grayscale digital image is an image in which value of each
pixel carries only the intensity information. Images of this sort are composed exclusively
of shades of gray, varying from black at the weakest intensity to white at the strongest.
Binary image – A binary image is a digital image that has only two possible values for
each pixel. It is often referred to a bi-tonal image as typically the two colors, black and
white would be used in a binary image. A binary image can be stored in memory as a
bitmap.
Aspect ratio – The aspect ratio of an image describes the proportional relationship
between its width and its height. It is commonly expressed as two numbers separated by a
colon as in .
Contrast –Contrast is the difference in luminance or color that makes an object
distinguishable.
Halftoning – It is a reprographic technique that simulates continuous tone. A continuous
tone image, such as a photograph, is converted into a black & white image wherein the
density and pattern of black and white dots simulate different shades of gray.
The novelty of visual cryptography lies in the fact that the encrypted message can be
decrypted directly by the human visual system, no complex computation or computer participation
is required [46]. This is the precise reason of visual cryptography attracting a lot of attention since
its inception and as a result, extensive research work has been carried out in this area. In this thesis,
Literature Review 5
we mainly deal with grayscale and black & white types of images as the original nature of VC. The
different model for computation has been proposed in the literature while working with different
aspects of the VCS and assessing it with respect to several parameters.
In Figure 2.2, the results of applying -VCS basic visual cryptography has been
shown.
Literature Review 6
The fact that there are solely black and white pixels in traditional VC makes this kind of VCS
easily to be implemented. The drawback of the superimposed result of secret restoration is in the
form of less contrast restored image. This is mainly due to its Boolean OR operation during
decryption which appears to have the problem of contrast loss. HVS is able to differentiate the
dark and white region if the contrast is higher than a certain level [1]. For encrypting the images,
three conditions must be satisfied. Firstly, images belongs to the qualified set access structure,
when superimposed, should reveal the secret image. Secondly, by inspecting the shares, no hint
should be available about the secret hidden within the shares. Finally, the image within the
shares should not be altered in any way.
P=.5
P=.5
P=.5
P=.5
Figure 2.3: (2, 2)-VCS for black and white image [1]
Now, consider the situation when two shares are superimposed as shown in the last
column of Figure 2.3. After superimposition of two shares we get two black sub-pixel in the
superimposed image for black pixel, whereas if is white, then we get one white and one black
sub-pixel in the superimposed image [49]. So the reconstructed pixel has a gray level of 1 if is
black and a gray level of 1⁄2 if is white. So, with a 50% loss of contrast in the reconstructed
image, the reconstructed image is still visible.
Each share consists of black and white sub-pixels. Each share of the sub-pixels is
printed on the transparency. The resulting structure can be described by Boolean
matrix ( ) where if and only if the sub-pixel in the share is black and
The gray level of this combined share is proportional to the Hamming weight . This
gray level is interpreted by the visual system of the users as black if for some fixed
threshold . Three variables control the reconstruction of black and white regions in
the recovered image: a threshold value , the pixel expansion and a relative contrast [46].
A Threshold is a numeric value that represents a gray level, which is perceived by the human eye
as the black color.
Literature Review 8
The construction for -OVCS achieves the optimality in terms of both pixel
expansion and relative contrast. Extended research work can be found in Athenies et al. [50]
where the authors have realized VCS on any general access structures. In 1996, Droste [51]
suggested an algorithm by using a linear program to construct -OVCS. Blundo et al. [52]
also relied on the linear programming for optimal contrast. For the first time, Blundo et al.
defined canonical form for a -OVCS and analyzed the contrast of VCS schemes.
In 2011, Shyu and Chen [53] considered the minimization of the pixel expansion of a
-OVCS into an ILP to get the optimum solution. Adhikari et al. [54] proposed a technique
to construct any -OVCS using linear algebra. The technique is useful even for the case
when is large enough. In order to improve the contrast of OR operation in VC, past research
has demonstrated four kinds of solutions. Specifically, the first contrast enhancing method is
based on analyzing the structure of basis matrix [52] [55]. The second effective way is to use
mathematical equations to analyze the contrast [56] [57] [58]. The third method is based on a
searching algorithm to search for the scheme which is able to generate the largest contrast [59]
[28].
In spite of improving the contrast of dark region and white as suggested still, the noise
exists in the pixels. Therefore, the fourth effective way of improving contrast is to use VC
restoration devices designed with other decryption models such as XOR and cover base which is
achieved by distributing more than one VC shares to each participant [11].
It is done by inserting a liquid crystal layer into a liquid crystal display (LCD). In
comparison with OR-based schemes where a participant has to carry a number of transcripts to
update the shares, in an XOR-based VCS a person has to carry just a device that has a display.
Literature Review 9
(a) Original Secret Image (b) Transformed Image by (c) The First Share S0
Halftoning process
(d) The Second Share of S1 (e) Stacked image using OR, (f) Stacked image using XOR,
(S0, S1) (S0, S1)
Figure 2.4: Process of XORing operation on VCS
For recovering the secret image the liquid crystal layers have to be stacked together.
Moreover, due to the rapid advancement of technology, these devices are getting cheaper. In the
suggested scheme for XOR [60] the authors constructed a XOR based -VCS and proved that a
XOR based VCS is equivalent to a binary code.
In general, XOR- based VCS are non-monotone i.e., if a qualified set of parties can
recover the secret image it does not necessarily hold that every superset is able to recover the secret
image. The main difference between these two models of visual cryptography lies in the fact that
the OR model captures strong access structures but in the XOR model due to the randomness of
the XOR operation, it is not possible to satisfy monotone properties However, we can solve this
problem with a slight modification in the definition of XOR scheme.
The security conditions for both the models are same, but the difference lies in the contrast
condition. Naor and Shamir’s [1] original suggestion has been extended in the 2-out-of-2
secret sharing scheme by using a halftoning technique. It also extends basic visual
cryptography a step further by supporting other variants of images.
density. The halftoning technique can be applied to both, color and grayscale images. Halftoning
techniques are frequently used within many VCS.
A halftone scheme was proposed [61] where the quality of the shares is improved by
using contrast enhancement techniques. However, this scheme lacks in perfect security feature.
All the previously discussed VC schemes suffer from pixel expansion in that the shares are larger
than the original secret image.
The error diffusion techniques spread the pixels as uniformly as possible to achieve the
improvements in the shares overall quality. Error diffusion is an adaptive technique that
quantizes each pixel according to the input pixel as well as its neighbors. Error diffusion forces
total tone content to remain the same and attempt to localize the distribution of tone levels [62].
At each pixel, the errors from its preceding neighbors are added to the original pixel value and a
threshold would be applied to this modified value.
(a) Original Grayscale Image (b) Halftone Image (c) The 1st Share S0
(c) The second Share S1 (d) Stacked image using OR, (S0, S1)
Figure 2.5: Halftoning process
Literature Review 11
Based on the idea of extended visual cryptography, Zhou et al. [63] set about improving
these techniques by proposing halftone grayscale images which carry significant visual
information. This drastically improves the security model for visual cryptography. Along with
Zhou, several authors present novel techniques by which halftone images can be shared with
significant visual meaning which have a higher quality than those presented within by employing
error diffusion techniques [62].
Another scheme proposed by Wang et al.[62] uses only boolean operations. The contrast
is also higher than other probabilistic visual cryptography sharing schemes. The area of contrast
within halftone and grayscale VC is an interesting one because the contrast determines exactly
how clear the visual secret is recovered. Cimato et al. [64] developed a visual cryptography
scheme with ideal contrast by using a technique known as reversing technique. The process of
reversing, changes black pixels to white pixels and vice-versa.
In the traditional VC, the VC shares are meaningless pictures which contain a random
pattern after application of halftoning operation.The original image shares are binary pictures or
grayscale pictures which can be transformed into meaningful shares using an extended visual
cryptography concept. The concept helps in providing security of shares.
There are two ways of implementing the extended VC. The first method is to define an
access structure of basis matrix which is used to generate a dither matrix to reproduce the input
image. The second way of generating embedded VC shares is achieved by calibrating the
halftone input image. In EVCS, the first shares need to be images of something like a train, car
or some form of meaningful information. The secret message is normally the message.
This requires a technique that has to take into consideration the color of the pixel in the secret
Literature Review 12
image. When the shares are superimposed, their individual images disappear and the secret
image can be seen.
The share in basic forms of VC potentially gives away the fact that they are encrypted.
Extended VC helps with this, producing meaningful shares which have the same pixel expansion
as the original basic VC schemes but it still has limited contrast with the recovered secret.
but only an almost perfect restoration of the white pixels. Cimato et al.[64] provide their results
for perfect restoration of both black and white pixels. Yang et al. [66] presented a scheme that
allowed perfect contrast reconstruction and also looked at the shortcomings of Viet and
Kurosawa’s scheme.
An approach based on coding theory helps to provide an optimal tradeoff between the
contrast and the number of sub-pixels. Optimal schemes are also examined in terms of
contrast related to the Hamming distance, as well as the sub-pixels tradeoff required for these
optimal schemes. The overall contrast affects the quality of the recovered secret so it is an
extremely important evaluation metric for any scheme which supports either a single secret or
multiple secret.
Suggested chen et al.[67] scheme is quite limited in its use. Due to the nature of the
angles required, this scheme can only share at most two secrets. As a
significant improvement, further approaches have changed the appearance of shares from rectangles
to circles share[68]. It helps not only to add additional information such as some supplementary
points, lines or markers but also extends the flexibility of the rotating angle to any degrees between
and [68] [69].
Further, dynamic VCS scheme has been suggested that encodes a set of secrets
into two circle shares [70]. This is one of the first set of presented results that is capable of sharing
more than two secrets in two shares only. The expansion is twice the number of secrets to be
hidden, so the size of the circle shares increases when number of secrets are hidden. However, the
number of secrets that are contained within the shares still remains hidden unless marking lines are
added to the circle shares for the alignment. Knowing how many secrets are actually contained
Literature Review 14
within the shares is also a big concern. If many secrets are concealed and rotation of the shares
occurs too quickly, it is possible that all secrets may not be recovered.
Feng et al.’s [70] proposed scheme is formally defined as a - -VSSM extended visual
cryptography secret sharing scheme for secret images. Once the shares are positioned at their
aliquot angles, the secrets are instantly revealed. The contrast of the scheme is also a big issue here.
The previously discussed schemes originated from Wu and Chen [68] and Shyu et al.[69] provide
better contrast, whereas Feng et al.’s scheme contrast is ⁄ times of pixel expansion . As the more
secrets would be added, the contrast becomes lower, so overall image quality deteriorates.
The prime concern of the multiple-secret VC is the determination of the exact position of
two secrets in shares for secret revealing. Especially for circular VC shares in the case of not
knowing the number of total hidden secrets, it is highly likely to result in the missing of the
restoration of unique secrets. Along with the improvement of increasing secret information
capacity, multiple secret visual cryptography has come with few more disadvantages. In
multiple-secret VC, the pixel needs to be expanded times of that in the traditional VC,
denotes to the number of secrets hidden in VC.
The most important part of any VC scheme is the contrast. The contrast for this scheme is
defined as follows: , where and are the probabilities with which a black
pixel on the reconstructed image is generated from a white and black pixel on the secret image.
Another method to deal with size invariant shares was proposed by Yang in which the
frequency of white pixels is used to show the contrast of the recovered image [73][74]. If quality
and contrast matter then the size of the shares also increase, for a user’s particular application. So
Literature Review 15
usually size invariant schemes incur a cost in terms of losing contrast. Image size invariant visual
cryptography for general access structures has also been suggested to improve the visual quality
[75].
The size invariant VCS adopts the access structure to store the information of VC shares and
uses OR operation as the basic secret recovery method. A typical example of the basis matrix of a
-size invariant VCS; it can be illustrated as below.
{ }
{ }
White pixels on the original secret is generated by superimposing two white pixels while
the black pixels is obtained by overlapping one black and one white pixel. Further, other research
in this direction has also been proposed to optimize size invariant VCS which effectively reduces
the pixel expansion scale [73] [74] [76]. Size invariant VCS scheme for color image is highly
needed and further research is required to make it optimal for different color model. Applying
visual cryptography techniques to the color images is a very important area of research because it
allows the use of natural color images to secure information inside the image.
Commonly three ways have been used to achieve color Visual Cryptography Scheme
(CVCS). In particular, the first method is to directly use the colors appeared in original secret
image [77].This CVCS method can also be classified into two approaches of concealing unused
colors on VC shares by black color and increasing or decreasing the color depth to imitate
different colors.The number of available represented colors is limited in most of the CVCS
scheme.
Literature Review 16
One typical example of this scheme is to expand every pixel in secret into a group of
pixels which is filled with red, green, and blue colors. The expanded pixel blocks are chosen from
these combinations which are similar to that of the original pixel in secret. This method effectively
reduces the required colors from to 4.
Another approach of implementing CVCS is based on separation of the color images into
three color channels (RGB) and then use halftone-related VCS to encrypt the three images
suggested by Liao and Huang. Verheul [78] used the concept of arcs to construct a colored visual
cryptography scheme. The key concept for a -color visual cryptography scheme is to transform
one pixel to sub-pixels, and each sub-pixel is divided into color regions. In each sub-pixel,
there is exactly one color region colored, and all the other color regions are black.
A major disadvantage of this scheme is the number of colors and the number of sub-
pixels to determine the resolution of the revealed secret image. If the number of colors is large,
coloring the sub-pixels will become a very difficult task. Stacking these transparencies correctly
and precisely by human beings is also a difficult problem.
Chang et al.[80] proposed a new secret color image sharing scheme based on modified
Literature Review 17
visual cryptography. It can encode the secret image precisely through a predefined color index
table and a few computations. The number of sub-pixels in this scheme is also proportional to the
number of colors appearing in the secret image. This scheme has another disadvantage in terms
of requirement of additional space to store the color index table.
In [80], Chang proposed a scheme applicable only for schemes in which the size of
the share is fixed and independent of the number of colors appearing in the secret image. Further,
the pixel expansion was only nine times of original pixel, which was the least amongst the
previously proposed methods.
As with many other visual cryptography schemes, pixel expansion is an issue in CVCS
also. However, Shyu’s scheme [81] has a pixel expansion of which is superior to many
other color visual cryptography schemes, especially when , the number of colors in the secret
image becomes large. In most color visual cryptography schemes, when the shares are
superimposed and the secret is recovered, the color image gets darker.
The basic idea of the progressive VC is based on encrypting a secret image into shares
and different qualities of recovered secret can be viewed by stacking different shares.Initial
techniques of the progressive VC were based on halftone with micro block encoding (Hou,
Chang & Tu, 2001). The Quality of the recovered secret gets increased in either resolution or the
completion of colors by superimposing more shares[82]. Moreover, as for the traditional VCS
which requires high recovery quality with less noise, the loss of contrast by using OR operation
can be fixed by XOR operation even though the implementation of using devices with computing
ability is difficult. Progressive VC has been developed in grayscale and color images (Jin, Yan &
Kankanhalli, 2005) as well.
Literature Review 18
(a) Original Secret Image (b) The First Share S0 (c) The Second Share S1
(d) The Third Share S2 (e) The Fourth Share S3 (f) Reconstructed Image from
(S0, S1)
Research of available different VCS based schemes have been described before the
discussion on the VC authentication problem and cheating immune VC. The previously
mentioned trends that have been emerging within VC require more attention.
Prevention of cheating via authentication methods [83] has been suggested which focus
on identification between two participants to help in the prevention of any type of cheating.
Tzeng et al. [83] proposed two types of cheating prevention mechanisms. The first one uses an
online trust authority to perform the verification between the participants. The second type
involves a change in the VC scheme whereby the stacking of two shares reveals a verification
symbol. The authentication process fails if the stacked VC shares have no appearance of their
predefined symbols. However, this method requires the addition of extra pixels in the secret.
Hu and Tzeng have also proved that both a malicious participant (MP), that is MP ,
and a malicious outsider (MO), MO , can cheat in specific circumstances. The MP is able to
construct a fake set of shares using his genuine share. As soon as the fake share would be stacked
on the genuine share, the fake secret can be viewed. The second method depicts that a MO is
capable of cheating the VC scheme without the knowledge of any genuine shares. The MO
creates a set of fake shares based on the optimal VCS. The fake shares also required to be
resized to that of the original genuine shares size.
Previous work has made several efforts in proposing cheating immune VCS[85]. Yang et
al. proposed a method of dividing the secret into two barcodes in visual secret sharing schemes
[86]. Commonly used ciphers include barcodes and may be the braille character in some
situation. There are only black or white pixels in a barcode, and it is difficult to be recognized by
human eyes due to its graphic arrangement structure. Conventionally, it’s data is stored in one-
dimensional barcodes by utilizing parallel lines. It is quite possible to utilize these symbols for
VC blind authentication technique.
Literature Review 20
Chen et al.[87], and Tsai & Horng [88] reviewed a number of well-known cheating
activities and Cheating-prevention Visual Secret-sharing Schemes (CPVSS). They categorized
cheated activities into meaningful cheating, non-meaningful cheating, and meaningful
deterministic cheating. Moreover, they analyzed the research challenges in CPVSS, and
proposed a new cheating prevention scheme which is better than the previous schemes in terms
of few security requirements. Not only cheating infact, the process of creation of shares during
the encoding process should always be robust. In all such cases, where the scheme itself
generates the artifact of secret image in any of the generated shares then scheme losses its
information to the corresponding participant. So,the creation of secure shares along with cheating
prevention schemes will be an attempt towards an ideal scheme for secure VCS.
The Moments are geometric features for describing an object. It describes about the
region, size location as well as shape [89]. The moments in VC authentication system can help to
solve with the problem of size invariance and computational complexity. The moment of a share
image is given as:
where and are the order of the moment, is the coordinate of a pixel in an image
. As for the binary images which only contain black and white pixels, white pixel number can
be simply calculated as:
A moment is a size invariant image feature. In the context of VC, the similarity between
the given VC share and the genuine VC can be calculated with the moments. Moreover, as the
moments are commonly used for pattern recognition, the similarity between the original secret
image and its VC share can also be measured. The similarity between secret and its share is
Literature Review 22
expected to be as low as possible since cheaters are able to extract the features of original secret
from shares if the computable feature of a VC share is close to that of the original secret.
Apart from the above mentioned features like image pixel histogram and moments;
entropy is also a widely utilized measurement for digital image processing. Entropy is a measure of
information capacity that can be used to characterize the texture of the input image. Image entropy
is a quantity which is used to describe the amount of information which must be coded by an
algorithm. Low entropy images usually have very little contrast and a large runs of pixels are
having same or similar values. An image which looks flat will have an entropy as zero.
The texture description of image features can be different, as it is based on the actual
need in practice. Tamura et al. [90] suggested a popular descriptor using image characteristics. It
helps significantly in detecting forgery.Therefore, one can also take advantage of texture as a
features in VC authentication. Specifically, Tamura texture is constituted by directionality,
contrast, roughness, line-likeness, regularity, and coarseness. Discrete wavelet transform, Fourier
transforms and Cosine transform are the widely used transforms for digital image processing in
the frequency domain[91]. Walsh transform used in DWT is a method for those binary images
which are robust and invertible. Apart from visual features, cryptographic features of VC shares
should be another frequently investigated topic for feature analysis of VC secret and shares.
2.5.2 Cryptographic Features of Visual Cryptography
Despite the security nature of VC, the previous evaluation of the security of VC mainly
focuses on designing appropriate VC systems to make this technique resistant against attacks
from cheaters. The Hash code provides the solution for the content based authorization problem
of VC shares in order to distinguish the correct share from the unauthorized ones. The modified
shares can be prevented in the authentication process by using hash code. The Cryptographic
hash function has benefits of easy to calculate the hash value of any input data. Hash functions
are employed in a range of areas related to security, such as message authentication, message
integrity and digital signatures.
There are two popular methods used for authentication of shares and secret. First attempt
is made by using an additional share to check the authentication of the share images and the
revealed secret.The second scheme uses a blind authentication technique to prohibit the
Literature Review 23
In this work, we explored the possibility of using these features for VC authentication
and secure share creation. This work provides an extensive survey of research on VCS and its
computational models along with its application. To the best of our knowledge, this is the first
time that these kinds of different features are explored together for VC authentication and a
suggestion in the form of chaos based VC for secure share creation has been given.
Suppose that the image is of size then there is a loop to go through each column and
nested loop for each pixel in a row of every column. As many such loops are there sequential, but
no further nested loop, so for just the generation of shares, algorithm complexity is . Say
algorithm step is to be run times, producing shares, then the complexity will be
. So limiting the value of to 5, for generating 6 shares for critical analysis, the complexity
becomes , which again gives the complexity of using asymptotic notation.
Security is satisfied if each share generated by a scheme reveals no information of the secret image
and the original image cannot be reconstructed if fewer than shares are present in ( scheme.
Accuracy is considered to be the quality of the reconstructed secret image and evaluated by different
similarity measures.
Literature Review 24
The major focus of the thesis to provide a secure scheme with advanced feature. So in most
of the schemes presented here, the quality of shares and the recovered original secret image have
been measured. The following approaches have been used in this thesis for image comparison and
analysis. The measures of similarity suggested in literature is mainly the mean squared error (MSE),
peak signal to noise ratio (PSNR), and the structural similarity (SSIM) index measure [93].
∑ ∑‖ ‖
Where and are the original and reconstructed images respectively, with a size
of .
2.6.2 Peak Signal to Noise Ratio (PSNR)
PSNR is a term for the ratio between the maximum possible power of a signal and the
noise. It represents a measure of the peak error. As signals have a very wide dynamic range, it is
usually expressed in the form of the logarithmic decibel scale. It is usually an approximation to
human perception of quality. Although a higher PSNR generally indicates that the reconstruction
is of higher quality, in some cases it may not. It is defined via the mean squared error (MSE) as:
( ⁄ )
Where, is the maximum possible pixel gray level value in the image. When the
pixels are represented using 8 bits per sample, this is between 0 to 255.
(PSNR) and mean squared error (MSE), which have proven to be inconsistent with human eye
perception.
Structural information is the idea that the pixels have strong relations and carry important
information about the structure of the objects in the visual scene. The SSIM metric is calculated
on different windows over an image[93] [94].
and are the two variables to stabilize the division, with weak denominator. These are
defined as , The default values of and are 0.01 and 0.03
respectively.
In order to hide the secrecy, one may go for expansion and increase the number of shares,
but this affects the resolution. Hence, research in VC is towards maintaining the contrast at the
same time maintaining the security.
A detailed comparison among the VCS schemes has been carried out using different
context [32]. As shown in Table 2.1, only a very few visual cryptography schemes attain the
desired minimum pixel expansion ratio. Shyu et al. scheme [95] require less overhead for storage
and transmission to share multiple secrets, while meaningful shares generated by the scheme [96]
[4] and [97] can be helpful to avoid attacks by hackers. The schemes supporting color images
[77] [78] and [80] and sometimes gray images are quite useful in the multimedia environment.
Literature Review 27
Essentially the most important part of any VC scheme is the contrast of the recovered
secret from a particular set of shares. Ideal schemes provide a high contrast when the secret is
recovered. However, a tradeoff is required in some schemes depending on the size of the shares
along with the number of secrets which may be concealed. Especially within extended visual
cryptography schemes, contrast is of major importance. Some schemes present methods which do
not work well with printed transparencies and depends on computation in order to recover the
secret.
Literature Review 28
In this respect, high quality secret recovery is possible, however, it is preferred if the
scheme works well with printed transparencies. After all, this is the core idea behind VC.
Conversely, if an application requires digital recovery of the secrets, then perfect recovery can be
achieved via the XOR operation. Shares size close to the original secret size is the best scheme
designed for any VC, as shares are easier to manage and transmit. Large secrets with even larger
shares become cumbersome. However, at times a tradeoff must be made between the size of the
shares and the contrast of the recovered secret. The tradeoff between size and the secret recovery
must be suitable so that high quality recovery can take place and must also ensure that the shares
do not expand into unmanageable sizes.
The use of grayscale and color images has added value to the field of visual
cryptography. The fact that any image type can be used to share a secret within visual
cryptography shows a great improvement in the very initial work that required an image to be
converted to its binary equivalent before any processing could be done on it. However, the
application of the scheme depends greatly on the type of images to be taken as input. Efficiency
covers a number of things which have already been discussed, such as contrast and the share
size. The concept of measuring efficiency also includes how the shares and images have been
processed.
Many of the schemes of VCS work extremely well and the techniques have proven to be
very useful for many applications for the purpose, such as verification and authentication. The
following noticeable observation has been identified within visual cryptography:
The various factors affect the VCS scheme before applying for any practical application,
e.g. pixel expansion, contrast, no. of shares generated, and type of shares.
Color supported VCS has been less explored in the literature and it seems computational
costly also because of its natural characteristics.
For getting higher contrast X-OR based schemes may be used, but with the cost of losing
natural VCs approach.
General schemes ( -out-of- ) have a different pixel expansion using the basis matrix
approach.
By using probability based recreation of pixel, suggested VCS are able to achieve
minimum pixel expansion
Literature Review 29
For the multimedia environment color VCS and gray level supporting VCS are quite
meaningful
In case of circular shares it seems difficult to find a reference point although it saves
space complexity of approach.
In order to hide the secrecy, we go for expansion and increase of the number of shares,
but this affects the resolution. Hence, research in VC is towards maintaining the contrast at the
same time maintaining the security. Based on the insight from the literature a new authentication
system has been suggested (to be discussed in the next chapter) which uses the technique of bit
level based processing of lukac and plataniotis [98] to improve the security level of existing
systems.
2.8 Summary
This chapter highlights previous research of VCS and the knowledge that is required for
exploring VC schemes further. Specifically, several paradigms in the research areas of VC have
been introduced, including traditional VC, extended VC, dynamic VC, color VC and progressive
VC. Different research findings have been analyzed and the efficiency, as well as the level of
difficulty, has been brought out. Various examples to illustrate the secret sharing schemes, in
general, has also been discussed. Several features of VC have been reviewed and analyzed in VC
authentication and creation of cheating free VCS.
This literature survey served as a firm grounding on the research topic and helped to
design our new approach. On the basis of past results and assistance from technologies such as
chaotic map, digital image processing, and cryptography, this thesis mainly focuses on making
improvement in enhancing the security of VC shares and along its application in practical cases
for authentication. Overall, this chapter has summarized much of the work done in the area of
visual cryptography. There are still many topics worth exploring within VC to further expand on
its potential in terms of secret sharing, data security, identification, and authentication.