|
Visual cryptography scheme (VCS) is a kind of cryptography that can be directly decoded by human visual system when transparent films are stacked. It requires no computation for decryption. VCS is often implemented as a threshold (k, n) scheme, which a secret image is subdivided into n shadow images (called shadows). Any k shadows can be simply superimposed together to recover the secret image. However, (k1) or fewer shadows cannot obtain any secret information. This novel stacking-to-see property of VCS can be applied on various applications. Recently, Luo et al. introduced a notion of color transfer visual cryptographic scheme (CTVCS) by embedding the information of color channels R, G and B into the conventional (k, n)-VCS. Luo et al.’s (k, n)-CTVCS can visually decode the halftoned secret image by stacking any k shadow images like the conventional (k, n)-VCS, and meanwhile it can obtain a high-quality color image. These visual qualities are good enough to be used in commercial products, e.g., the ChLCD display of electronic paper book and advertising board. However, the information of color channels are represented explicitly on shadows, and thus a key is used to permute color pixels to achieve the security. Therefore, Luo et al.’s (k, n)-CTVCS is, strictly speaking, not a threshold scheme because the recovery of the information of color channels is based on a permutation key. Because a halftoned image is transformed from a gray-level image by digital halftoning technique, and the intensities of color channels can be converted to a grayscale. Therefore, there definitely exists a tight relation between the intensities of color channels and the pixel value of a halftoned image. By using an inherent property of digital image, we propose a (k, n)-CTVCS with perfect security, and do not need permuting pixels. We formally define contrast and security conditions of a (k, n) - CTVCS. Also, we theoretically prove that our CTVCSs satisfy these conditions. Experiment results demonstrate the feasibility of our constructions. Keywords: Visual cryptography, Secret Sharing, Threshold scheme, Color transfer VCS, halftoned image.
|