Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach

2019 ◽  
Vol 28 (2) ◽  
pp. 896-911 ◽  
Author(s):  
Bin Yan ◽  
Yong Xiang ◽  
Guang Hua

Visual secret sharing (VSS) is a well-known technique from the past few decades for data security. Recently, XOR based VSS has attracted many researchers due to its lossless or good visual quality of reconstructed secret image. Cheating in visual cryptography based VSS was introduced by Horng et. al. in 2006. Cheating occurs when a dishonest participant presents fake share and performs stacking of fake share with honest participants who have genuine share, thereby revealing the fake secret image instead of the original secret image. Cheating occurs when some XOR based VSS are exposed to collusion attacks. Here, in this paper, we have demonstrated and proved that there is a security issue in existing XOR based VSS schemes.


Author(s):  
Rahul Sharma ◽  
Nitesh Kumar Agrawal ◽  
Ayush Khare ◽  
Arup Kumar Pal

In this paper, the authors have presented a (n, n) extended visual cryptography scheme where n numbers of meaningful shares furnish a visually secret message. Initially they have converted a grayscale image into binary image using dithering method. Afterwards, they have incorporated pixel's eight neighboring connectivity property of secret image during formation of meaningful shares. The scheme is able to generate the shares without extending its size. This approach has enhanced the visual quality of the recovered secret image from n numbers of shares. The scheme has been tested with some images and satisfactory results are achieved. The scheme has improved the contrast of the recovered secret image than a related (n, n) extended visual cryptography scheme.


2020 ◽  
Vol 10 (4) ◽  
pp. 1321
Author(s):  
Yusheng Guo ◽  
Xingxing Jia ◽  
Qimeng Chu ◽  
Daoshun Wang

A ( k , n ) visual cryptography (VC) scheme encodes a secret image into n shadows that are printed on transparencies distributed among a group of n participants secretly, and reveal the secret image by stacking no less than k of them. Its decryption requires no computation and attracts much attention in image security applications. The pixel expansion and contrast are two important characteristics to evaluate the visual quality of the revealed secret image for a ( k , n ) -VC scheme. The ( k , n ) XOR-based VC (XVC) schemes can greatly improve the visual quality including both pixel expansion and contrast. Previous methods require complex computation and result in high pixel expansion when they are used to construct such schemes. In this paper, we propose a pixel expansion adjustable ( k , n ) -XVC scheme, which allows pixel expansion to be changed among 2 k - 1 - 1 different values. It can ensure each pixel being exactly recovered with the same average contrast no matter it takes any pixel expansion value. The least pixel expansion is much smaller than previous schemes. Our scheme can be easily implemented based on any conventional OR-based ( k , n ) -VC (OVC) scheme.


Cryptography ◽  
2020 ◽  
pp. 449-457
Author(s):  
Rahul Sharma ◽  
Nitesh Kumar Agrawal ◽  
Ayush Khare ◽  
Arup Kumar Pal

In this paper, the authors have presented a (n, n) extended visual cryptography scheme where n numbers of meaningful shares furnish a visually secret message. Initially they have converted a grayscale image into binary image using dithering method. Afterwards, they have incorporated pixel's eight neighboring connectivity property of secret image during formation of meaningful shares. The scheme is able to generate the shares without extending its size. This approach has enhanced the visual quality of the recovered secret image from n numbers of shares. The scheme has been tested with some images and satisfactory results are achieved. The scheme has improved the contrast of the recovered secret image than a related (n, n) extended visual cryptography scheme.


Author(s):  
Junyoung Yun ◽  
Hong-Chang Shin ◽  
Gwangsoon Lee ◽  
Jong-Il Park

Author(s):  
Mingliang Xu ◽  
Qingfeng Li ◽  
Jianwei Niu ◽  
Hao Su ◽  
Xiting Liu ◽  
...  

Quick response (QR) codes are usually scanned in different environments, so they must be robust to variations in illumination, scale, coverage, and camera angles. Aesthetic QR codes improve the visual quality, but subtle changes in their appearance may cause scanning failure. In this article, a new method to generate scanning-robust aesthetic QR codes is proposed, which is based on a module-based scanning probability estimation model that can effectively balance the tradeoff between visual quality and scanning robustness. Our method locally adjusts the luminance of each module by estimating the probability of successful sampling. The approach adopts the hierarchical, coarse-to-fine strategy to enhance the visual quality of aesthetic QR codes, which sequentially generate the following three codes: a binary aesthetic QR code, a grayscale aesthetic QR code, and the final color aesthetic QR code. Our approach also can be used to create QR codes with different visual styles by adjusting some initialization parameters. User surveys and decoding experiments were adopted for evaluating our method compared with state-of-the-art algorithms, which indicates that the proposed approach has excellent performance in terms of both visual quality and scanning robustness.


2021 ◽  
pp. 112067212110021
Author(s):  
Javier Ruiz-Alcocer ◽  
Irene Martínez-Alberquilla ◽  
Amalia Lorente-Velázquez ◽  
José F Alfonso ◽  
David Madrid-Costa

Purpose: To objectively analyze the optical quality of the FineVision Toric intraocular lens (IOL) with two cylinder powers when different combinations of rotations and residual refractive errors are induced. Methods: This study assessed the FineVision Toric IOL with two different cylinder powers: 1.5 and 3.0 diopters (D). Three different rotation positions were considered: centered, 5° and 10° rotated. An optical bench (PMTF) was used for optical analysis. The optical quality of the IOLs was calculated by the modulation transfer function (MTF) at five different focal points (0.0, 0.25, 0.50, 0.75, and 1.00 D). Results: The MTF averaged value of the reference situation was 38.58 and 37.74 for 1.5 and 3.0 D of cylinder, respectively. For the 1.5 D cylinder, the combination of 5° of rotation with a defocus of 0.25, 0.50, 0.75, and 1.0 D induced a decrease on the MTF of 12.39, 19.94, 23.43, 24.23 units, respectively. When induced rotation was 10°, the MTF decrease was 17.26, 23.40, 24.33, 24.48 units, respectively. For the 3.0 D cylinder, the combination of 5° with 0.25, 0.50, 0.75, and 1.0 D of defocus, induced a decrease on the MTF of 12.51, 18.97, 22.36, 22.48 units, respectively. When induced rotation was 10°, the MTF decrease was: 18.42, 21.57, 23.08, and 23.61 units, respectively. Conclusion: For both FineVision Toric IOLs there is a certain optical tolerance to rotations up to 5° or residual refractive errors up to 0.25 D. Situations over these limits and their combination would affect the visual quality of patients implanted with these trifocal toric IOLs.


Sign in / Sign up

Export Citation Format

Share Document