Share Email Print
cover

Proceedings Paper

Visual cryptography via halftoning
Author(s): Gonzalo R. Arce; Zhi Zhou; Giovanni Di Crescenzo
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Visual cryptography encodes a secret binary image SI into n shares of random binary patterns. The secret image can be visually decoded by superimposing a qualified subset of shares, but no secret information can be obtained from the superposition of a forbidden subset. Such a scheme is mathematically secure, however, the binary patterns of the n shares have no visual meaning, raising the suspicion of data encryption. In order to achieve a higher level of security, halftone visual cryptography was proposed to encode a secret binary image into n halftone shares (images) carrying significant visual information. The method is further extended in this paper. Based on blue-noise dithering principles, a global optimization method is proposed to improve the overall visual quality of all n halftone shares. Thus, the adversaries are less likely to suspect the presence of hidden cryptographic information.

Paper Details

Date Published: 18 December 2003
PDF: 12 pages
Proc. SPIE 5293, Color Imaging IX: Processing, Hardcopy, and Applications, (18 December 2003); doi: 10.1117/12.532655
Show Author Affiliations
Gonzalo R. Arce, Univ. of Delaware (United States)
Zhi Zhou, Samsung Information Systems America (United States)
Giovanni Di Crescenzo, Telcordia Technologies, Inc. (United States)


Published in SPIE Proceedings Vol. 5293:
Color Imaging IX: Processing, Hardcopy, and Applications
Reiner Eschbach; Gabriel G. Marcu, Editor(s)

© SPIE. Terms of Use
Back to Top