TY - JOUR
T1 - On the security of a visual cryptography scheme for color images
AU - Leung, Bert W.
AU - Ng, Felix Y.
AU - Wong, Duncan S.
PY - 2009/5
Y1 - 2009/5
N2 - Hou [Visual cryptography for color images, Pattern Recognition 36 (2003) 1619-1629] proposed a four-share visual cryptography scheme for color images. The scheme splits a dithered eight-color secret image into four shares: the black mask and other three shares. It was claimed that without knowing the black mask, no information about the secret image can be obtained even if all the other three shares are known. In this paper, we show that this may be true for a few specific two-color secret images only. In all other cases, however, security cannot be guaranteed. We show that an attacker can compromise a randomly chosen two-color secret image from any two of the other three shares with probability frac(4, 7) by completely recovering the shape and pattern of the secret image. The advantage will increase to frac(6, 7) if all the three shares are known. If the secret image has three or four colors, we show that the attacker can compromise it with probability frac(4, 7) and frac(8, 35), respectively. Finally, we show that our technique can be extended to compromising secret images with more than four colors. © 2008 Elsevier Ltd. All rights reserved.
AB - Hou [Visual cryptography for color images, Pattern Recognition 36 (2003) 1619-1629] proposed a four-share visual cryptography scheme for color images. The scheme splits a dithered eight-color secret image into four shares: the black mask and other three shares. It was claimed that without knowing the black mask, no information about the secret image can be obtained even if all the other three shares are known. In this paper, we show that this may be true for a few specific two-color secret images only. In all other cases, however, security cannot be guaranteed. We show that an attacker can compromise a randomly chosen two-color secret image from any two of the other three shares with probability frac(4, 7) by completely recovering the shape and pattern of the secret image. The advantage will increase to frac(6, 7) if all the three shares are known. If the secret image has three or four colors, we show that the attacker can compromise it with probability frac(4, 7) and frac(8, 35), respectively. Finally, we show that our technique can be extended to compromising secret images with more than four colors. © 2008 Elsevier Ltd. All rights reserved.
KW - Color decomposition
KW - Cryptanalysis
KW - Dithering technology
KW - Secret sharing
KW - Visual cryptography
UR - http://www.scopus.com/inward/record.url?scp=58249094362&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-58249094362&origin=recordpage
U2 - 10.1016/j.patcog.2008.08.031
DO - 10.1016/j.patcog.2008.08.031
M3 - RGC 21 - Publication in refereed journal
SN - 0031-3203
VL - 42
SP - 929
EP - 940
JO - Pattern Recognition
JF - Pattern Recognition
IS - 5
ER -