skip to main content
research-article

Image hatching for visual cryptography

Published: 20 September 2012 Publication History

Abstract

Image hatching (or nonphotorealistic line-art) is a technique widely used in the printing or engraving of currency. Diverse styles of brush strokes have previously been adopted for different areas of an image to create aesthetically pleasing textures and shading. Because there is no continuous tone within these types of images, a multilevel scheme is proposed, which uses different textures based on a threshold level. These textures are then applied to the different levels and are then combined to build up the final hatched image. The proposed technique allows a secret to be hidden using Visual Cryptography (VC) within the hatched images. Visual cryptography provides a very powerful means by which one secret can be distributed into two or more pieces known as shares. When the shares are superimposed exactly together, the original secret can be recovered without computation. Also provided is a comparison between the original grayscale images and the resulting hatched images that are generated by the proposed algorithm. This reinforces that the overall quality of the hatched scheme is sufficient. The Structural SIMilarity index (SSIM) is used to perform this comparison.

References

[1]
Ateniese, G., Blundo, C., De Santis, A., and Stinson, D. R. 1996. Extended schemes for visual cryptography. Theor. Comput. Sci. 250, 1--16.
[2]
Blundo, C., D'Arco, P., De Santis, A., and 368 Stinson, D. R. 2003. Contrast optimal threshold visual cryptography schemes. SIAM J. Discr. Math. 16, 2, 224--261.
[3]
Elber, G. 1995a. Line art rendering via a coverage of isoparametric curves. IEEE Trans. Vis. Comput. Graph. 1, 3, 231--239.
[4]
Elber, G. 1995b. Line illustrations in computer graphics. Visu. Comput. 11, 6, 290--296.
[5]
Elber, G. 1998a. Line art illustrations of parametric and implicit forms. IEEE Trans. Visu. Comput. Graph. 4, 1, 71--81.
[6]
Elber, G. 1998b. Line art illustrations of parametric and implicit forms. IEEE Trans. Visu. Comput. Graph. 4, 1, 71--81.
[7]
Feng, J.-B., Wu, H.-C., Tsai, C.-S., Chang, Y.-F., and Chu, Y.-P. 2008. Visual secret sharing for multiple secrets. Pattern Recogn. 41, 12, 3572--3581.
[8]
Hasluck, P. N. 1977. Manual of Traditional Wood Carving. Dover, New York.
[9]
Hofmeister, T., Krause, M., and Simon, H.-U. 2000. Contrast-Optimal k out of n secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240, 2, 471--485.
[10]
Hou, Y. C., Chang, C. Y., and Tu, S. F. 2001. Visual cryptography for color images based on halftone technology. In Proceedings of International Conference on Image, Acoustic, Speech and Signal Processing, Part 2.
[11]
Hsu, H.-C., Chen, T.-S., and Lin, Y.-H. 2004. The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. Netw. Sens. Control 2, 996--1001.
[12]
Ito, R., Kuwakado, H., and Tanaka, H. 1999. Image size invariant visual cryptography. Inst. Electron. Inf. Commun. Engin. Trans. E82-A, 10, 2172--2177.
[13]
Ivins, W. M. 1987. How Prints Look, Photographs with Commentary, revised ed. Beacon Press, Boston, MA.
[14]
Ivins, W. M. 1992. Prints and Visual Communication. MIT Press.
[15]
Lau, D. L. and Arce, G. R. 2000. Modern Digital Halftoning. Marcel Dekker.
[16]
Memon, N. and Wong, P. W. 1998. Protecting digital media content. Commun. ACM 41, 7, 35--43.
[17]
Ostromoukhov, V. 1999. Digital facial engraving. In Proceedings of the ACM SIGGRAPH '99 Conference. 417--424.
[18]
Praun, E., Hoppe, H., Webb, M., and Finkelstein, A. 2001. Real-Time hatching. In Proceedings of the ACM SIGGRAPH '01 Conference. ACM, New York, 581.
[19]
Salisbury, M., Anderson, C., Lischinski, D., and Salesin, D. H. 1996. Scale-Dependent reproduction of pen-and-ink illustrations. In Proceedings of the ACM SIGGRAPH '96 Conference. ACM, New York, 461--468.
[20]
Salisbury, M. P., Anderson, S. E., Barzel, R., and Salesin, D. H. 1994. Interactive pen-and-ink illustration. In Proceedings of the ACM SIGGRAPH '94 Conference. ACM, New York, 101--108.
[21]
Shamir, A. 1979. How to share a secret. Commun. ACM 22, 11, 612--613.
[22]
Shyu, S. J. 2006. Efficient visual secret sharing scheme for color images. Pattern Recogn. 39, 5, 866--880.
[23]
Shyu, S. J., Huang, S.-Y., Lee, Y.-K., Wang, R.-Z., and Chen, K. 2007. Sharing multiple secrets in visual cryptography. Pattern Recogn. 40, 12, 3633--3651.
[24]
Wang, Z., Arce, G., and Di Crescenzo, G. 2009. Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4, 3, 383--396.
[25]
Wang, Z. and Bovik, A. 2009. Mean squared error: Love it or leave it? A new look at signal fidelity measures. IEEE Signal Process. Mag. 26, 1, 98--117.
[26]
Wang, Z., Bovik, A., Sheikh, H., and Simoncelli, E. 2004. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 13, 4, 600--612.
[27]
Weir, J. and Yan, W. 2008. Multimedia Communication Security: Recent Advances. Nova Science Publishers, Chapter Visual Cryptography: A Survey.
[28]
Weir, J. and Yan, W.-Q. 2009a. Dot-Size variant visual cryptography. In Proceedings of the International Workshop on Digital Watermarking (IWDW). 136--148.
[29]
Weir, J. and Yan, W.-Q. 2009b. Sharing multiple secrets using visual cryptography. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS'09).
[30]
Yang, C.-N., Wang, C.-C., and Chen, T.-S. 2006. Real perfect contrast visual secret sharing schemes with reversing. In Applied Cryptography and Network Security. 433--447.
[31]
Zhou, Z., Arce, G. R., and Di Crescenzo, G. 2006. Halftone visual cryptography. IEEE Trans. Image Process. 15, 8, 2441--2453.

Cited By

View all
  • (2024)EVCS-DAS: Evolving Visual Cryptography Schemes for Dynamic Access StructuresACM Transactions on Multimedia Computing, Communications, and Applications10.1145/370854721:3(1-27)Online publication date: 14-Dec-2024
  • (2023)Enhancement of Information Carrying and Decoding for Visual Cryptography with Error CorrectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/361292720:1(1-24)Online publication date: 5-Aug-2023
  • (2022)Fake and Dishonest Participant Immune Secret Image SharingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/357284219:4(1-26)Online publication date: 24-Nov-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 8, Issue 2S
Special Issue on Multimedia Security
September 2012
121 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/2344436
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 September 2012
Accepted: 01 May 2011
Revised: 01 May 2011
Received: 01 February 2011
Published in TOMM Volume 8, Issue 2S

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cryptography
  2. data encryption
  3. image hatching
  4. structural similarity
  5. visual cryptography

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)EVCS-DAS: Evolving Visual Cryptography Schemes for Dynamic Access StructuresACM Transactions on Multimedia Computing, Communications, and Applications10.1145/370854721:3(1-27)Online publication date: 14-Dec-2024
  • (2023)Enhancement of Information Carrying and Decoding for Visual Cryptography with Error CorrectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/361292720:1(1-24)Online publication date: 5-Aug-2023
  • (2022)Fake and Dishonest Participant Immune Secret Image SharingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/357284219:4(1-26)Online publication date: 24-Nov-2022
  • (2021)Robust Secret Image Sharing Resistant to Noise in SharesACM Transactions on Multimedia Computing, Communications, and Applications10.1145/341975017:1(1-22)Online publication date: 16-Apr-2021
  • (2021)Securing images on cloud using visual cryptography2021 5th International Conference on Trends in Electronics and Informatics (ICOEI)10.1109/ICOEI51242.2021.9452827(572-575)Online publication date: 3-Jun-2021
  • (2020)Challenges to Multimedia Privacy and Security Over Social MediaHandbook of Research on Cyber Crime and Information Privacy10.4018/978-1-7998-5728-0.ch007(118-131)Online publication date: 21-Aug-2020
  • (2020)Penrose tiling for visual secret sharingMultimedia Tools and Applications10.1007/s11042-020-09568-079:43-44(32693-32710)Online publication date: 29-Aug-2020
  • (2018)Visual Cryptography for Securing Images in CloudCyber Security and Threats10.4018/978-1-5225-5634-3.ch021(360-380)Online publication date: 2018
  • (2016)Visual Cryptography for Securing Images in CloudCombating Security Breaches and Criminal Activity in the Digital Sphere10.4018/978-1-5225-0193-0.ch015(242-262)Online publication date: 2016
  • (2016)Progressive Visual Cryptography with Unexpanded Meaningful SharesACM Transactions on Multimedia Computing, Communications, and Applications10.1145/293561812:4(1-24)Online publication date: 24-Aug-2016
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media