Pixel expansion and the quality of the reconstructed secret image has been a major issue of visual secret sharing (VSS) schemes. A number of probabilistic VSS schemes with minimum pixel expansion have been proposed for black and white (binary) secret images. This paper presents a probabilistic (2, 3)-VSS scheme for gray scale images. Its pixel expansion is larger in size but the quality of the image is perfect when it's reconstructed. The construction of the shadow images (transparent shares) is based on the binary OR operation.
1
Visual Secret Sharing Scheme using Grayscale Images
Sandeep Katta
Department of Computer Science, Oklahoma State University
Stillwater, OK 74078
ABSTRACT: Pixel expansion and the quality of the reconstructed secret image has been a
major issue of visual secret sharing (VSS) schemes. A number of probabilistic VSS schemes
with minimum pixel expansion have been proposed for black and white (binary) secret images.
This paper presents a probabilistic (2, 3)-VSS scheme for gray scale images. Its pixel expansion
is larger in size but the quality of the image is perfect when it‟s reconstructed. The construction
of the shadow images (transparent shares) is based on the binary OR operation.
KEYWORDS: visual secret sharing, 2-out-of-3 secret sharing, grayscale cryptography.
- INTRODUCTION
Secret sharing techniques belong to the larger area of information hiding that includes
watermarking [1]-[8]. In secret sharing, random looking shares when brought together recreate
the secret. In recursive secret sharing, the shares themselves have components defined at a lower
recursive level [3]-[6]. The injection of the random bits in the shares may be done conveniently
using d-sequences [9]-[11] or other random sequences.
A grayscale image is an image in which the value of each single pixel is a sample, that is, it
carries only intensity information. The darkest possible shade is black, which is the total absence
of transmitted or reflected light and the lightest possible shade is white.
According to their physical characteristics, different media use different ways to represent
the color level of images. The computer screen uses the electric current to control lightness of the
pixels. The diversity of the lightness generates different color levels. The general printer, such as
2
dot matrix printers, laser printers, and jet printers can only control a single pixel to be printed
(black pixel) or not to be printed (white pixel), instead of displaying the gray level. As such, the
way to represent the gray level of images is to use the density of printed dots. The method that
uses the density of the net dots to simulate the gray level is called “halftone” and transforms an
image with gray level into a binary image before processing. Every pixel of the transformed
halftone image has only two possible color levels (black or white). Because human eyes cannot
identify too tiny printed dots and, when viewing a dot, tend to cover its nearby dots, we can
simulate different gray levels through the density of printed dots, even though the transformed
image actually has only two colors – black and white.
Visual secret sharing (VSS) schemes [1]-[4],[12] have been proposed only with black and
white (binary) images. Several schemes for grayscale images [14] and for color images [13], [15]
have been proposed. However, these earlier works result in a decrypted image of reduced
quality. I here propose a new gray-level visual cryptography scheme and the image quality in this
proposed scheme is better than anything and provides high quality images including that of
perfect (original) quality to be reconstructed. The generation of the shadow images is based on
Boolean operations, and the reconstruction operation uses OR, as in other VSS schemes.
- PROPOSED APPROACH
In the proposed scheme I convert each grayscale block into a binary block. First of all
each pixel value in a grayscale block is transformed into binary representation. For example take
a grayscale block and transform into binary blocks.
111
159
20
254
10
198
40
215
100
Its corresponding binary blocks are as follows:
3
[0 1 1 0 1 1 1 1]
[1 0 0 1 1 1 1 1]
[0 0 0 1 0 1 0 0];
[1 1 1 1 1 1 1 0]
[0 0 0 0 1 0 1 0]
[1 1 0 0 0 1 1 0];
[0 0 1 0 1 0 0 0]
[1 1 0 1 0 1 1 1]
[0 1 1 0 0 1 0 0].
Take each binary block and go for different possible combinations of that block, and try to
design the block into different shares. For example take a grayscale block and divide the block
into shares and apply the above scheme.
2.1
Two-out-of-Three Scheme using Grayscale Images
This proposed scheme is totally different from that of previous schemes. Here I design
the shares such a way that when combining any two shares will reveal the original bit
information, but not the whole share just half of each single share will give me high quality
image when reconstructed. I will explain this scheme by taking a value from the grayscale block
and divide that value into shares.
254: [1 1 1 1 1 1 1 0]
1st half
2nd half
Share1:
0 1 0 1 0 1 0 0
1 1 0 1 1 0 1 0
Share2:
1 0 1 0 1 0 1 0
1 1 1 0 1 1 1 0
Share3:
0 0 1 0 0 1 0 0
1 0 0 1 0 1 0 0
Table-1: Grayscale bits are transformed into Binary bits
Share1 (1st half): 0 1 0 1 0 1 0 0
Share3 (1st half): 0 0 1 0 0 1 0 0
Share2 (1st half): 1 0 1 0 1 0 1 0
Share1 (2nd half): 1 1 0 1 1 0 1 0
1 1 1 1 1 1 1 0 = 2
This content is AI-processed based on open access ArXiv data.