Table Of ContentHandbook of
Image-Based Security
Techniques
Handbook of
Image-Based Security
Techniques
Shivendra Shivani
Suneeta Agarwal
Jasjit S. Suri
MATLAB® is a trademark of The MathWorks, Inc. and is used with permission. The MathWorks
does not warrant the accuracy of the text or exercises in this book. This book’s use or discussion
of MATLAB® software or related products does not constitute endorsement or sponsorship by The
MathWorks of a particular pedagogical approach or particular use of the MATLAB® software.
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2018 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Printed on acid-free paper
Version Date: 20180427
International Standard Book Number-13: 978-1-1-38-05421-9 (Hardback)
This book contains information obtained from authentic and highly regarded sources. Reasonable
efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and
publishers have attempted to trace the copyright holders of all material reproduced in this publication
and apologize to copyright holders if permission to publish in this form has not been obtained. If any
copyright material has not been acknowledged please write and let us know so we may rectify in any
future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access
www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc.
(CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization
that provides licenses and registration for a variety of users. For organizations that have been granted
a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and
are used only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
To my beloved family members for encouraging and
admiring me to believe that I am capable of authoring
a book.
Shivendra Shivani
To my husband for his untiring effort and support.
Suneeta Agarwal
To all my collaborators around the world.
Jasjit S. Suri
Contents
Foreword xxiii
Preface xxv
Authors xxix
Section I Visual Cryptography
hapter
C 1(cid:4) Visual Cryptography: Introduction 3
1.1 INTRODUCTION 4
1.2 VISUALCRYPTOGRAPHY 5
1.3 APPLICATIONSOFVISUALCRYPTOGRAPHY 7
1.3.1 Trojan-Free Secure Transaction 7
1.3.2 Authentication 10
1.3.3 Access Control 11
1.3.4 Transaction Tracking 11
1.3.5 Watermarking 11
1.4 PRELIMINARIES 11
1.5 FUNDAMENTALPRINCIPLESOFVISUALSECRET
SHARING 13
1.5.1 Pixels Expansion m 13
1.5.2 Contrast α 14
1.5.3 Basis Matrices 15
1.5.4 Concept of Black and White Pixels in Visual
Cryptography 16
1.6 FORMATIONOFABASISMATRIX 16
1.6.1 Observations Related to The Basis Matrix
Creation Approach of Naor and Shamir 17
1.6.2 Essential Conditions for a Basis Matrix 18
vii
viii (cid:4) Contents
1.7 DIFFERENTEVALUATIONPARAMETERS 19
1.7.1 Objective Evaluation Parameters 19
1.7.2 Subjective Parameters 23
hapter
C 2(cid:4) Various Dimensions of Visual Cryptography 27
2.1 VARIOUSDIMENSIONSOFVISUALCRYPTOGRAPHY 28
2.1.1 Traditional Visual Cryptography (TVC) 29
2.1.1.1 Threshold visual cryptography 30
2.1.2 Extended Visual Cryptography (EVC) 32
2.1.2.1 Halftone visual cryptography (HVC) 32
2.1.2.2 Significance of a halftone image over a
binary image 33
2.1.2.3 Halftone image creation using error
diffusion 33
2.1.2.4 Tagged visual cryptography (TVC) 37
2.1.2.5 Friendly visual cryptography (FVC) 39
2.1.2.6 Size invariant visual cryptography 39
2.1.2.7 Progressive visual cryptography (PVC) 42
2.1.2.8 Progressive visual cryptography with
meaningful shares without pixel expan-
sion 43
2.1.3 Dynamic Visual Cryptography (DVC) 47
2.1.3.1 Multitone/Continuous tone visual
cryptography (MVC) 47
2.1.3.2 MVCwithunexpandedmeaningfulshares 49
2.1.3.3 Perfect recovery of the secret image in
MVC 50
2.1.3.4 Visual cryptography with multiple se-
crets or multi secret sharing (MSS) 51
2.1.3.5 Angle restriction problem in MSS 51
2.1.3.6 Multi secret sharing with unexpanded
meaningful shares 54
2.1.3.7 XOR-based visual cryptography 54
2.1.3.8 Hybrid approach with XOR-based VC,
multitone VC, FVC, size invariant VC
and multi secret sharing 56
2.1.3.9 Verifiable visual cryptography (VVC) 57
Contents (cid:4) ix
2.1.3.10 Hybrid approach with VVC 60
2.1.3.11 Random grid-based visual cryptography
(RGVC) 60
2.1.3.12 Hybrid approaches using RGVC 61
hapter
C 3(cid:4) VC Approaches with Computationless Recovery
of Secrets 65
3.1 COMPUTATIONLESSANDCOMPUTATION-BASED
VISUALCRYPTOGRAPHYAPPROACHES 66
3.2 BASICS FOR THE DEVELOPMENT OF COMPUTATION-
LESSVCAPPROACHES 68
3.2.1 Development of Threshold Visual Cryptography 68
3.2.2 Development of a Halftone Visual Cryptography
(HVC) Scheme 74
3.2.3 Development of a Friendly Visual Cryptography
(FVC) Scheme 77
3.2.4 Development of Size Invariant Visual
Cryptography 80
3.2.4.1 Preprocessing of secret image for size
invariant visual cryptography 80
3.2.4.2 Size invariant share generation with the
help of the preprocessed secret 84
3.2.5 Development of a Hybrid Approach Using
Friendly Visual Cryptography (FVC) and Size
Invariant Visual Cryptography 86
3.2.5.1 Steps for making a hybrid approach 86
3.2.6 Development of Random Grid-Based Visual
Cryptography 91
3.2.6.1 Steps to generate shares using a random
grid 93
3.2.7 Development of Visual Cryptography with
Multiple Secrets 95
3.2.7.1 Steps to generate shares for multiple
secrets 95
3.2.8 Development of Progressive Visual
Cryptography (PVC) 100
Description:"This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking