Halftone visual cryptography

IEEE Trans Image Process. 2006 Aug;15(8):2441-53. doi: 10.1109/tip.2006.875249.

Abstract

Visual cryptography encodes a secret binary image (SI) into n shares of random binary patterns. If the shares are xeroxed onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the n shares, however, have no visual meaning and hinder the objectives of visual cryptography. Extended visual cryptography [1] was proposed recently to construct meaningful binary images as shares using hypergraph colourings, but the visual quality is poor. In this paper, a novel technique named halftone visual cryptography is proposed to achieve visual cryptography via halftoning. Based on the blue-noise dithering principles, the proposed method utilizes the void and cluster algorithm [2] to encode a secret binary image into n halftone shares (images) carrying significant visual information. The simulation shows that the visual quality of the obtained halftone shares are observably better than that attained by any available visual cryptography method known to date.

Publication types

  • Evaluation Study
  • Research Support, U.S. Gov't, Non-P.H.S.

MeSH terms

  • Algorithms
  • Colorimetry / methods
  • Computer Graphics*
  • Computer Security*
  • Data Compression / methods*
  • Image Interpretation, Computer-Assisted / methods*
  • Patents as Topic
  • Pattern Recognition, Automated / methods*
  • Product Labeling / methods*
  • Signal Processing, Computer-Assisted*