11
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 197 A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group Sian-Jheng Lin and Wei-Ho Chung, Member, IEEE Abstract—The visual cryptography (VC) is a secret sharing scheme where a secret image is encoded into trans- parencies, and the stacking of any out of transparencies reveals the secret image. The stacking of or fewer transparencies is unable to extract any information about the secret. We discuss the additions and deletions of users in a dynamic user group. To reduce the overhead of generating and distributing transparencies in user changes, this paper proposes a VC scheme with unlimited based on the probabilistic model. The proposed scheme allows to change dynamically in order to include new transparencies without regenerating and redistributing the original transparen- cies. Specically, an extended VC scheme based on basis matrices and a probabilistic model is proposed. An equation is derived from the fundamental denitions of the VC scheme, and then the VC scheme achieving maximal contrast can be designed by using the derived equation. The maximal contrasts with to are explicitly solved in this paper. Index Terms—Contrast, random grids (RGs), secret sharing, vi- sual cryptography (VC). I. INTRODUCTION V ISUAL cryptography (VC) is a branch of secret sharing. In the VC scheme, a secret image is encoded into trans- parencies, and the content of each transparency is noise-like so that the secret information cannot be retrieved from any one transparency via human visual observation or signal analysis techniques. In general, a -threshold VC scheme has the fol- lowing properties: The stacking of any out of those VC gener- ated transparencies can reveal the secret by visual perception, but the stacking of any or fewer number of transparen- cies cannot retrieve any information other than the size of the secret image. Naor and Shamir [1] proposed a -threshold VC scheme based on basis matrices, and the model had been further studied and extended. The related works include the VC schemes based on probabilistic models [2]–[4], general access structures [5], [6], VC over halftone images [7], [8], VC for color images [9], cheating in VC [10], [11], the general formula of VC schemes [12], and region incrementing VC [13]. Contrast is one of the important performance metrics for VC schemes. Generally, the stacking revelation of the secret with Manuscript received May 09, 2011; revised August 15, 2011; accepted Au- gust 17, 2011. Date of publication September 06, 2011; date of current version January 13, 2012. This work was supported by the National Science Council of Taiwan, under Grant NSC 100-2221-E-001-004. The associate editor co- ordinating the review of this manuscript and approving it for publication was Dr. Carlo Blundo. The authors are with the Research Center for Information Technology In- novation, Academia Sinica, Nankang, Taipei 115, Taiwan (e-mail: whc@citi. sinica.edu.tw). Digital Object Identier 10.1109/TIFS.2011.2167229 higher contrast represents the better visual quality, and there- fore the stacking secret with high contrast is the goal of pur- suit in VC designs. Naor and Shamir [1] dene a contrast for- mula which has been widely used in many studies. Based on the denition of contrast, there are studies attempting to achieve the contrast bound of VC scheme [4], [14]–[20]. For in- stance, Blundo et al. [17] give the optimal contrast of VC schemes. Hofmeister et al. [19] provide a linear program which is able to compute exactly the optimal contrast for VC schemes. Krause and Simon [20] provide the upper bound and lower bound of the optimal contrast for VC schemes. Moreover, there exist VC related researches using differential denitions of contrast [21]–[23]. Another important metric is the pixel expansion denoting the number of subpixels in trans- parency used to encode a secret pixel. The minimization of pixel expansions has been investigated in previous studies [24], [25]. The probabilistic model of the VC scheme was rst intro- duced by Ito et al. [2], where the scheme is based on the basis matrices, but only one column of the matrices is chosen to en- code a binary secret pixel, rather than the traditional VC scheme utilizing the whole basis matrices. The size of the generated transparencies is identical to the secret image. Yang [31] also proposed a probabilistic model of VC scheme, and the two cases and are explicitly constructed to achieve the optimal contrast. Based on Yang [31], Cimato et al. [32] pro- posed a generalized VC scheme in which the pixel expansion is between the probabilistic model of VC scheme and the tradi- tional VC scheme. Encrypting an image by random grids (RGs) was rst intro- duced by Kafri and Keren [26] in 1987. A binary secret image is encoded into two noise-like transparencies with the same size of the original secret image, and stacking of the two transparen- cies reveals the content of the secret. Comparing RGs with basis matrices, one of the major advantages is that the size of gener- ated transparencies is unexpanded. The RG scheme is similar to the probabilistic model of the VC scheme, but the RG scheme is not based on the basis matrices. The recent studies include the RG for color image [27], RG, and RG schemes [28], [29]. We also compare the proposed method with RG [29] in Section IV. We consider the scenario of a dynamic user group, where new participants are to join the user group with original par- ticipants; and the transparencies need to accommodate the new users. If the transparencies are to be generated with the traditional VC scheme, the original transparencies need to be discarded, and the new transparencies need to be generated with the traditional VC scheme. The regeneration and redistribution of the whole transparencies con- sume computing and communication resources and may lead to 1556-6013/$26.00 © 2011 IEEE http://ieeexploreprojects.blogspot.com

A probabilistic model of visual cryptography scheme with dynamic group.bak

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: A probabilistic model of visual cryptography scheme with dynamic group.bak

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 197

A Probabilistic Model of Visual CryptographyScheme With Dynamic Group

Sian-Jheng Lin and Wei-Ho Chung, Member, IEEE

Abstract—The visual cryptography (VC) is a secretsharing scheme where a secret image is encoded into trans-parencies, and the stacking of any out of transparencies revealsthe secret image. The stacking of or fewer transparencies isunable to extract any information about the secret. We discuss theadditions and deletions of users in a dynamic user group. To reducethe overhead of generating and distributing transparencies in userchanges, this paper proposes a VC scheme with unlimitedbased on the probabilistic model. The proposed scheme allowsto change dynamically in order to include new transparencies

without regenerating and redistributing the original transparen-cies. Specifically, an extended VC scheme based on basis matricesand a probabilistic model is proposed. An equation is derived fromthe fundamental definitions of the VC scheme, and then the

VC scheme achieving maximal contrast can be designedby using the derived equation. The maximal contrasts withto are explicitly solved in this paper.

Index Terms—Contrast, random grids (RGs), secret sharing, vi-sual cryptography (VC).

I. INTRODUCTION

V ISUAL cryptography (VC) is a branch of secret sharing.In the VC scheme, a secret image is encoded into trans-

parencies, and the content of each transparency is noise-like sothat the secret information cannot be retrieved from any onetransparency via human visual observation or signal analysistechniques. In general, a -threshold VC scheme has the fol-lowing properties: The stacking of any out of those VC gener-ated transparencies can reveal the secret by visual perception,but the stacking of any or fewer number of transparen-cies cannot retrieve any information other than the size of thesecret image. Naor and Shamir [1] proposed a -thresholdVC scheme based on basis matrices, and the model had beenfurther studied and extended. The related works include the VCschemes based on probabilistic models [2]–[4], general accessstructures [5], [6], VC over halftone images [7], [8], VC forcolor images [9], cheating in VC [10], [11], the general formulaof VC schemes [12], and region incrementing VC [13].Contrast is one of the important performance metrics for VC

schemes. Generally, the stacking revelation of the secret with

Manuscript received May 09, 2011; revised August 15, 2011; accepted Au-gust 17, 2011. Date of publication September 06, 2011; date of current versionJanuary 13, 2012. This work was supported by the National Science Councilof Taiwan, under Grant NSC 100-2221-E-001-004. The associate editor co-ordinating the review of this manuscript and approving it for publication wasDr. Carlo Blundo.The authors are with the Research Center for Information Technology In-

novation, Academia Sinica, Nankang, Taipei 115, Taiwan (e-mail: [email protected]).Digital Object Identifier 10.1109/TIFS.2011.2167229

higher contrast represents the better visual quality, and there-fore the stacking secret with high contrast is the goal of pur-suit in VC designs. Naor and Shamir [1] define a contrast for-mula which has been widely used in many studies. Based onthe definition of contrast, there are studies attempting to achievethe contrast bound of VC scheme [4], [14]–[20]. For in-stance, Blundo et al. [17] give the optimal contrast ofVC schemes. Hofmeister et al. [19] provide a linear programwhich is able to compute exactly the optimal contrast forVC schemes. Krause and Simon [20] provide the upper boundand lower bound of the optimal contrast for VC schemes.Moreover, there exist VC related researches using differentialdefinitions of contrast [21]–[23]. Another important metric isthe pixel expansion denoting the number of subpixels in trans-parency used to encode a secret pixel. The minimization of pixelexpansions has been investigated in previous studies [24], [25].The probabilistic model of the VC scheme was first intro-

duced by Ito et al. [2], where the scheme is based on the basismatrices, but only one column of the matrices is chosen to en-code a binary secret pixel, rather than the traditional VC schemeutilizing the whole basis matrices. The size of the generatedtransparencies is identical to the secret image. Yang [31] alsoproposed a probabilistic model of VC scheme, and thetwo cases and are explicitly constructed to achievethe optimal contrast. Based on Yang [31], Cimato et al. [32] pro-posed a generalized VC scheme in which the pixel expansion isbetween the probabilistic model of VC scheme and the tradi-tional VC scheme.Encrypting an image by random grids (RGs) was first intro-

duced by Kafri and Keren [26] in 1987. A binary secret imageis encoded into two noise-like transparencies with the same sizeof the original secret image, and stacking of the two transparen-cies reveals the content of the secret. Comparing RGs with basismatrices, one of the major advantages is that the size of gener-ated transparencies is unexpanded. The RG scheme is similar tothe probabilistic model of the VC scheme, but the RG schemeis not based on the basis matrices. The recent studies includethe RG for color image [27], RG, and RG schemes[28], [29]. We also compare the proposed method withRG [29] in Section IV.We consider the scenario of a dynamic user group, where

new participants are to join the user group with original par-ticipants; and the transparencies need to accommodate the new

users. If the transparencies are to be generated withthe traditional VC scheme, the original transparenciesneed to be discarded, and the new transparencies needto be generated with the traditional VC scheme. Theregeneration and redistribution of the whole transparencies con-sume computing and communication resources and may lead to

1556-6013/$26.00 © 2011 IEEE

http://ieeexploreprojects.blogspot.com

Page 2: A probabilistic model of visual cryptography scheme with dynamic group.bak

198 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012

the potential security vulnerability. The addition and deletion ofusers are further discussed in Section IV-A.In this paper, we propose a probabilistic model of VC

scheme with unlimited . The major contribution is that theproposed scheme accommodates dynamic changes of users inthe group sharing a VC secret. The proposed scheme allowschanges of users without regeneration and redistribution of VCtransparencies, which reduce the computing and communica-tion resources in accommodating user changes. The scheme iscapable of generating an arbitrary number of transparencies andthe explicit algorithms are proposed to generate the transparen-cies. For a group with initial users, the proposed Algorithm1 explicitly generates the required transparencies. Fornewly joining participants, the new transparencies can beexplicitly generated through Algorithm 2, and the new trans-parencies can be distributed to the new participants withoutthe need to update the original transparencies. The secondarycontribution is that this paper designs an implementation of

VC based on the probabilistic model, and the proposedscheme allows the unlimited number of users. For the conven-tional VC scheme to implement the case , themathematical manipulations of infinite size of basis matricesand variables are often required, which is computationallyprohibitive. Our approach designs an implementation schemewhich is capable of producing a finite subset of the completeinfinite transparencies through the proposed Algorithms 1 and2, with computationally feasible operations. We also derive anoptimization problem to solve the maximal contrast of theproposed VC scheme.

Notations

The threshold of a VC scheme.

The number of generated transparencies of aVC scheme.

The number of subpixels to encode a secretpixel; i.e., the width of the basis matrices.

Stacking operation, equivalent to the bitwiseoperation “OR.”

and Two collections of Boolean matrices.

The number of ones in a vector .

The contrast of the VC scheme based on basismatrices.

and Two Boolean matrices whereand .

A Boolean matrix containing allpossible combinations of zeros andones as the columns.

and Two vectors to represent the multiplicities ofin and .

The contrast of the probabilistic model of VCscheme.

, A column randomly selected from and .

The frequency probability of appearing onesin a vector .

, The discrete probability distribution of allcolumns in and .

A memoryless binary sequence with values ofelements as 0 or 1, where the probability ofassigning each element to 0 is .

A vector .

, Two vectors to record the nonzero terms in.

An optimization problem to find the optimalcontrast of VC scheme.

A binary secret image.

A ready-to-process pixel taken from .

The th generated transparency.

A pixel at , and the position corresponds tothe position of .

and is the number of original participants in theuser group initially, and is the number ofnew participants to join the user group.

An index table where is the index ofthe used memoryless sequence toencode the secret pixel .

The probability of the event .

A group which contains all columns of thematrix as the elements.

II. EXTENDED VERSION BASED ON BASIS MATRICES ANDPROBABILISTIC MODEL

A. Basis Matrices

The basis matrices of VC scheme were first introducedby Naor and Shamir [1]. In this paper, a white-and-black secretimage or pixel is also described as a binary image or pixel. Inthe basis matrices, to encode a binary secret image , each se-cret pixel white black will be turned into blocks atthe corresponding position of transparencies ,respectively. Each block consists of subpixels and each sub-pixel is opaque or transparent. Throughout this paper, we use 0to indicate a transparent subpixel and 1 to indicate an opaquesubpixel. If any two subpixels are stacked with matching posi-tions, the representation of a stacked pixel may be transparent,when the two corresponding pixels are both transparent. Oth-erwise, the stacked pixel is opaque. Let denote the stackingoperation, defined as

Actually, can be treated as the bitwise operation “OR.” It isnoted that we use the notation to indicate the stacking ofthe two transparencies and , since and can be treatedas two Boolean matrices.

http://ieeexploreprojects.blogspot.com

Page 3: A probabilistic model of visual cryptography scheme with dynamic group.bak

LIN AND CHUNG: PROBABILISTIC MODEL OF VC SCHEME WITH DYNAMIC GROUP 199

For the basis matrices, two collections of Booleanmatrices and are constructed to encode the binary pixel ,respectively. Each row of the matrix in and correspondsto an encoded block, and the elements represent the subpixels.Before describing the definitions of and , we first explainhow to encode . For being white, the dealer randomly choosesa matrix from with uniform distribution and then sends allthe rows to each , respectively. For being black, the dealerrandomly chooses a matrix from with uniform distributionand then sends all the rows to each , respectively. The andare required to meet the conditions described in Definition

1. Let denote the hamming weight of a -vector(i.e., the number of ones in ).Definition 1: A VC scheme with subpixels and con-

trast can be represented as two collections ofBoolean matrices and . Let be a constant integer. Avalid VC scheme is required to meet the following conditions[1]:1) For any matrix in , the stacked of any out of therows in the matrix satisfies .

2) For any matrix in , the stacked of any out of therows in the matrix satisfies .

3) For any -element subsetand , the two collections of matrices ob-tained by restricting each matrix in and , to rows

are indistinguishable in the sense that theycontain the same matrices with the same frequencies.

The first and the second conditions represent the contrast re-quirements. In general, with larger , the stacking result is morevisually distinguishable. The third condition represents the se-curity requirement. A valid VC must be able to prevent thesecret pixels from being revealed by analyzing the patterns orprobability distributions from transparencies for .If we find an Boolean matrix and anBoolean matrix , we can construct and by

permuting all columns of and [1], expressed as

If two Boolean matrices and can be adjusted tobecome the same matrix with reordering columns, andare equivalent in terms of generating . Therefore, the ordersof columns of and are technically insignificant.The previous studies indicated that the “totally symmetric”

scheme [19] (also called the canonical form [15]) is only consid-ered for constructing and , since the studies [15] and [19]proved that the “totally symmetric” schemes cover theVC schemes with optimal contrast. Let denote an

Boolean matrix consisting of all possible combinations ofzeros and ones as columns of . A matrix

is called “totally symmetric” if can be divided into some, with horizontal concatenation. Thus,

the and of a “totally symmetric” VC scheme can be pre-sented as two vectors and

in which is the multiplicity of in. The relation between and is

(1)

Example 1: An example of a (3, 4) VC scheme is

The are

Thus, is represented as , and is rep-resented as .

B. Probabilistic Model of VC Scheme

In the scenario where is very large, i.e., , to con-struct is impractical. Thus, the proposal of a new VC schemeis required in order to overcome the above problem. The proba-bilistic model of VC is first introduced by Ito et al. [2]. Insteadof the basis matrices expanding a secret pixel into a block withsubpixels in transparencies, the probabilistic model of VC

only uses one subpixel to represent one secret pixel. The idea isbriefly described as follows.To encode the secret image , the probabilistic model of VC

constructs two basis matrices and . For the secret pixelbeing white, the dealer randomly chooses a column fromwith uniform distribution and sends each element to ,

respectively. For being black, the dealer randomly chooses acolumn from with uniform distribution and sends eachelement to , respectively. To decode , any out of thetransparencies are stacked .Then the region white is probabilistically morelikely to appear white than the region black is.Thus, we have

(2)

where is the probability of the event , and is abinary value taken from (if is white) or (if is black). Thenotation means that are

http://ieeexploreprojects.blogspot.com

Page 4: A probabilistic model of visual cryptography scheme with dynamic group.bak

200 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012

any elements in . As a result, can be interpreted by visualperception since the human visual system can be treated as a lowpass filter. On the other hand, to protect , in the case where thenumber of stacked transparencies is smaller than , the regioncorresponding to the white pixels in is probabilistically iden-tical, in terms of appearing black or white, to the region corre-sponding to the black secret pixels. In other words, the regions

white are probabilistically indistinguishable to theregions black on the stacking result. The propertyis expressed as

(3)

For the contrast condition described in probabilitymodel [2], thecontrast between white and black pixels is calculated from thedifferential “probability” of appearing zero and not the differen-tial “frequency” used in basis matrices. The contrast is definedas

(4)

to distinguish used in Definition 1. Let de-note the frequency probability of appearing ones in . The defi-nition of Probabilistic VC scheme based on and isgiven as follows.Definition 2: A Probabilistic VC scheme with contrast

can be represented as two Boolean matricesand . Let be a constant integer; a valid Probabilistic VCmust satisfy the following conditions:1) The stacked of any out of the rows in satisfies

.2) The stacked of any out of the rows in satisfies

.3) For any -element subsetand , the two matrices obtained by restrictingeach matrix in and , to rows are theidentical.

C. Proposed VC Scheme

The proposed method is based on the basis matrices and theidea of probabilistic model. For a VC scheme, the “to-tally symmetric” form of and are both constructed anddescribed as and , respectively. For a column randomlyselected from with uniform distribution, let be the prob-ability that consists of zeros and ones. The isexpressed by

(5)

where outputs a group which contains all columns of thematrix as the elements, and we have

(6)

(7)

Thus, andrepresent the probability distribu-

tions by which the columns are selected to encode white and

black secret pixels , and by (7), and are homogeneous toand for describing and , respectively. According

to the probabilistic model, we randomly choose a columnfrom ; since consists of many submatrices , supposea column is chosen from . This step can be simulated byrearranging a vector consisting of zeros and onesrandomly, and all possible combinations are equally likely tobe a candidate, since all columns in have equal chancesto be selected. This property reduces the memory requirementto store and during encoding. For the case ,the generated column becomes a (0-1) memoryless sequence

where the probability of assigning each elementto 0 is (i.e., ). In termsof computer programming, can be simulated with arandom Boolean generator where the probability of generating0 is and generating 1 is . For convenience, in therest of the paper, the abbreviation PrVC scheme denotesthe probabilistic model of VC with unlimited .Lemma 1: For any elements generated from

the secret pixel with PrVC scheme, after the stacking, the probability of the stacking result ap-

pearing zero is

and

.Proof: To encode the secret pixel , a candidate in

is chosen, and the generatedelements are assigned to , respec-tively. The probability of generating as the candidateis . Suppose is generated to encode the secret pixel.For the case where transparencies are stacked, the probabilityof the secret pixel appearing zero is , because thecorresponding elements at the transparencies,are required to be all zeros, and we have

Therefore, the probability of a pixel appearing zero is.

As stated in the security condition in Definition 2, afterstacking any rows ( ) in and to obtain two vectorsand , we have . Based on the results of

Lemma 1, the equations maintaining the security conditionare described as

(8)

where , and. On the other hand, by (6), we have

(9)

http://ieeexploreprojects.blogspot.com

Page 5: A probabilistic model of visual cryptography scheme with dynamic group.bak

LIN AND CHUNG: PROBABILISTIC MODEL OF VC SCHEME WITH DYNAMIC GROUP 201

and is described as

(10)

D. The PrVC Scheme With Optimal Contrast

In this section, we focus on the construction of thePrVC scheme with optimal contrast. For convenience, the ab-breviation OptPrVC scheme is used to denote thePrVC scheme with optimal contrast.Lemma 2: For and of OptPrVC scheme, if

, then ; and if , then .Proof: Suppose and

are the OptPrVCscheme with the optimal contrast but and

. Thus, for , satisfies (6)(8)(10) whichare described as

(11)

(12)

(13)

Then, a new scheme with contrastis constructed by the following steps. First, calculate

; second, construct and each term is

if

otherwise.

To verify that satisfies (6), substituting in (6), we obtain

To verify the security condition in Definition 2, for, substituting in (8), we obtain

(14)

The result of (14) equal to 0 is obtained by the using result of(12). To verify the contrast condition in Definition 2, substi-tuting in (10), we obtain

(15)

The contrast is larger than since is largerthan 1. Hence we obtain that has better contrast than ,which incurs contradiction.A similar result of Lemma 2 for finite had been pointed out

by previous work [12]. Lemma 2 gives an immediate mappingfrom to and which is described as

ififif

(16)

(17)

Lemma 3: For OptPrVC scheme, there is a con-sisting of nonzero values and zeros.

Proof: By (8), (9), (10), and (17), a linear program toachieve the optimal contrast is described as

(18)

(19)

(20)

(21)

In order to remove the absolute symbols in (19), we divide thefeasible region into subregions according to the sign ofeach . Then the above linear program is divided intosubproblems, expressed as

(22)

(23)

(24)

(25)

(26)

where is the sign of in each subregion. Thereare one formula (23), one formula (24), and formulas (25)

http://ieeexploreprojects.blogspot.com

Page 6: A probabilistic model of visual cryptography scheme with dynamic group.bak

202 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012

as the constraints of the linear program, and those formulas arelinearly independent as long as the subregion is not empty, andthe maximal lies at the boundary sets (26). Thus, consistsof nonzero values and zeros.Since the nonzero terms in represent the critical

values, those nonzero terms are recorded by two vectorsand , where is the

probability of using the memoryless sequence to encodethe secret pixel taken from the secret image , withfor white and for black. Without loss of gen-erality, is arranged in increasing order (i.e., ). Inother words, the th nonzero term is recorded in andsuch that and . The equations of andare described as

(27)

Example 2: For andobtained from Example 1, the , , , , and are

By (8), (9), and (10), the equations substituted withand are expressed as

(28)

(29)

(30)

Then, (28)–(30) are expressed in the matrix form as

......

. . ....

......

(31)

The matrix is the transpose of a Vander-monde matrix. By the property of , we usethe inverse Vandermonde matrix to obtain . In fact, the co-efficients of inverse Vandermonde matrix can be expressed asLagrange polynomials[30]. We fill with those coefficientsto obtain

... .... . .

...

...

(32)

where are don’t-care terms, since those values will be multi-plied by zeros in the later stage. Then is described as

(33)

Lemma 4: For an OptPrVC scheme, if is even,then ; otherwise, if is odd, then .

Proof: The result is easily verified by (33).By Lemma 4, all values of are grouped into two setsEven integer and Odd integer ; and the sums

of all elements in both set are 1 and , respectively. By (33),their mathematical formulations are expressed as

(34)

(35)

By (34) and (35), is expressed as

(36)

Lemma 5: For the of a OptPrVC scheme,and .

Proof: Suppose is a OptPrVC scheme butor . We generate a new where each

term in is

ififotherwise.

Then the contrast of is better than by substi-tuting and in (36).Finally, the optimization problem is derived by com-

bining (27) and (36) with Lemma 5. The optimization problemis described as

(37)

(38)

The target function is the reciprocal of . Krause and Simon[20] proved that the contrast of VC scheme is no lessthan , so the outcome of is expected to be .

http://ieeexploreprojects.blogspot.com

Page 7: A probabilistic model of visual cryptography scheme with dynamic group.bak

LIN AND CHUNG: PROBABILISTIC MODEL OF VC SCHEME WITH DYNAMIC GROUP 203

TABLE IOF SOME OPTPRVC SCHEMES FOR

We use Maple to solve for , and the results arelisted in Table I.

E. Encoding Algorithm

For a given value of , the transparencies can be continuouslygenerated with the OptPrVC scheme. However, prac-tical applications require the algorithm to terminate within fi-nite steps. To meet the requirement, a finite number is used tospecify the number of transparencies in the algorithm. The algo-rithm requires , obtained by solving or by lookingup Table I. The outputs of Algorithm 1 are transparencies

and an index table , where is the indexof the used memoryless sequence to encode the se-cret pixel .

Algorithm 1. The algorithm of OptPrVC scheme

Input: A binary secret image , two positive integers , ,and two vectors .Output: transparencies ; an index table .

1 for each pixel in do2 if white then3 Generate an integer

and .4 else5 Generate an integer

and.

6 end if7 .8 for to do9 Assign randomly to 0 or 1 where

.10 end for11 end for

In the first round, we use Algorithm 1 to generate trans-parencies and . If we need not to generate more transparen-cies in the future, is not required and discarded. Otherwise,has to be stored in a safe place, and we can generate more

transparencies by utilizing .

Fig. 1. Binary secret image.

Fig. 2. Results of OptPrVC scheme. (a) . (b) . (c) .

Algorithm 2. The algorithm of OptPrVC scheme bythe index table

Input: An index table , a positive integer , and a vector .Output: transparencies .

1 for each in do2 for to do3 Assign randomly to 0 or 1 where

.4 end for5 end for

III. EXPERIMENTAL RESULTS

Three experiments are performed for and . Fig. 1shows the binary secret image . Fig. 2 shows the first experi-ment for . Fig. 2(a)–(b) shows two generated transparen-cies and , and the stacking result is shown inFig. 2(c). We observe that the characters on the stacking resultare clear. Based on Lemma 1, we verify the security and con-trast of the three experiments. We use to indi-cate any generated transparencies with the proposed scheme,and is a pixel at and the position corresponds to the secretpixel .For a single transparency , the probabilities of a white se-

cret pixel appearing zero and a black secret pixel appearing zeroare

Therefore, the white pixels and black pixels cannot be distin-guished by observing only one transparency. In the case wheretwo transparencies are stacked , the contrast

http://ieeexploreprojects.blogspot.com

Page 8: A probabilistic model of visual cryptography scheme with dynamic group.bak

204 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012

Fig. 3. Results of OptPrVC scheme. (a) . (b) . (c) . (d) .(e) . (f) . (g) .

verification is

Thus, the contrast is .Fig. 3 shows the second experiment for . Fig. 3(a)–(c)

show three generated transparencies , , and , andFig. 3(d)–(f) show the results of stacking any two transparen-cies , , and . Fig. 3(g) is the result ofstacking the three transparencies , and we can seecontours of the secret on stacking result. The verifications ofsecurity and contrast are described as follows.For a single transparency , the security verification is

In the case where arbitrary two transparencies are stacked, the security verification is

In the case where arbitrary three transparencies are stacked, the contrast verification is

Thus, the contrast is .Fig. 4 shows the third experiment for . Fig. 4(a)–(d)

show four generated transparencies , , , and . It isnoted that we skip the stacking results of arbitrary two orthree transparencies due to the large number of combinations.Fig. 4(e) shows the stacking result , where

Fig. 4. Results of OptPrVC scheme. (a) . (b) . (c) . (d) .(e) .

the characters on the stacking result are barely visible. Theverifications of security and contrast are described as follows.For a single transparency , the security verification is

In the case where two transparencies are stacked , thesecurity verification is

In the case where three transparencies are stacked, the security verification is

In the case where four transparencies are stacked, the contrast verification is

Thus, the contrast is .

IV. DISCUSSIONS AND APPLICATIONS

A. Addition and Deletion of Users in the Dynamic User Group

Since the proposed scheme allows dynamic changes of usersin the user group, the operations to add and delete users are elab-orated in this section. For the addition of new participants to

http://ieeexploreprojects.blogspot.com

Page 9: A probabilistic model of visual cryptography scheme with dynamic group.bak

LIN AND CHUNG: PROBABILISTIC MODEL OF VC SCHEME WITH DYNAMIC GROUP 205

TABLE IIOPTIMAL CONTRAST VC SCHEMES FOR

the user group with original participants, the transparenciesneed to be able to accommodate the new users.In the case where the original transparencies are producedthrough the traditional VC scheme, the original trans-parencies need to be eliminated, and then the new set oftransparencies need to be generated through theVC scheme. The frequent regeneration and redistribution of thewhole set of transparencies consume huge computing and com-munication resources for a dynamically changing user group,and may lead to potential security risks if certain original trans-parencies are not discarded completely. For example in the caseof , an original participant holding one of originalVC transparencies and obtaining one of the newVC transparencies might potentially be able to decode the secretby stacking the two transparencies. In the applications with aknownmaximal number of participants , the better strategyis to apply the VC scheme to generate trans-parencies; and each authorized participant is assigned a trans-parency. By applying the VC scheme, the additionand departure of users can be accommodated without frequentregeneration and redistributions of transparencies. However, inmany applications, the is unknown and applying a largernumber as is a feasible option to avoid the overflow ofusers over the . The proposed OptPrVC schemeaccommodates the addition and departure of users without theproblem of user overflow. In addition, with very large ,the contrast of the OptPrVC scheme is similar to the

VC scheme addressed in Section IV-B.For the deletion of users, we suppose that out of () participants are to leave the user group. If the contrast is to be

optimized, the original transparencies need to be eliminated,and the new transparencies need to be generated throughthe VC scheme; the process consumes computingand communication resources for a frequently changing usergroup. Another strategy is to retrieve the transparencies fromthe departing participants; those retrieved transparencies can beassigned to the new participants. For the proposed Opt-PrVC scheme to accommodate the scenarios of departing users,the departing users can simply discard the transparencies, andthe new transparencies for new users can simply be generatedthrough Algorithm 2; the retrieval of the transparencies fromthe departing users is not required. The authentication and se-curity of the retrieved transparencies present a more challengingproblem and relevant studies can be found in [11] and [33].

B. Contrast Comparisons of the Proposed Scheme WithTraditional VC Schemes

In general, the contrast of the OptPrVC scheme islower than certain VC schemes with a finite value of .Nevertheless, if is very large, the OptPrVC has some

Fig. 5. Experimental result of (2, 100) PrVC. (a) . (b) . (c) .

advantages over the traditional VC scheme. In this case,the contrast of using the VC scheme is similar to the

OptPrVC scheme. The VC schemes with optimalcontrast for and various values of are listed inTable II, which is duplicated for reference from [19], except for

. For , the contrast iswhich is very closes to . In addition, For

, the contrast is which is alsovery closes to . Thus, the stacking results of

OptPrVC scheme and VC scheme are very closeto each other for large . Fig. 5 is an example of the (2, 100)VC scheme based on probabilistic model with contrast 25/99.We can see similar qualities in Figs. 5(c) and 2(c). However, thetraditional VC scheme requires larger amounts of compu-tations and memory space to construct basis matrices. A simpleanalysis is discussed as follows.For two basis matrices and of the traditionalVC scheme, the memory space is needed to store

and . To encode a secret pixel, first, the arithmetic sequenceis permutated to obtain with

operations; second, each row of or is duplicated to thecorresponding transparency, and the elements of each row arearranged by following the orders withI/O operations. Thus, the encoding includes computa-tions and I/O operations, and the dominates thetraditional VC scheme due to the essentiality of the dupli-cating operations during the production of transparencies. It isnoted that the encoding complexity is if the I/O operationis excluded from the complexity measure. On the other hand, theproposed probabilistic VC scheme requires the values oftwo vectors and , whose lengths are both . To encodea secret pixel, an -element memoryless sequence is generated,which takes operations. The value of depends on theconstruction method of and . Blundo et al. [17] provedthat a traditional VC scheme with holds theproperty . Thus, the space complexity and the timecomplexity of the VC scheme are both . On theother hand, the proposed scheme takes spaceand operations. Thus, the proposed method substantiallyreduces the computations and memory space for large .

C. Comparisons of With Two Linear Programs

Hofmeister et al. [19] provide an elegant linear program tocalculate the optimal contrast of VC scheme. In addition,the basis matrices can be constructed by the solution of the linear

http://ieeexploreprojects.blogspot.com

Page 10: A probabilistic model of visual cryptography scheme with dynamic group.bak

206 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012

TABLE IIICOMPARISONS OF WITH OTHER OPTIMIZATION EQUATIONS

program. We restate the linear program as follows:

(39)

(40)

(41)

(42)

requires variables to cal-culate the optimal contrast of VC schemes. Obviously, for

, (39)–(42) cannot be explicitly formulated due to the in-finite terms of the sigma summation, so is not compu-tationally feasible. The proposed is a specialized optimiza-tion problem under , and (37) and (38) are well formu-lated capable of solving the variables .On the other hand, for a finite integer of , is more suit-able than .Moreover, Bose and Mukerjee [14] also provide the -norm

optimization equation to calculate the optimal contrast of theVC scheme; the equation is restated as follows:

(43)where , and the contrast is givenas . For , (43) also cannot be explicitlyformulated due to the infinite terms of the sigma summation.Table III lists the comparisons.

D. Comparisons of the Proposed Method With RG Scheme

Table IV shows the comparisons of the OptPrVCscheme with RGs [26]–[29]. Rather than the basis matrices,the size of RG’s transparencies is identical to the secret image,and this property is similar to the proposed OptPrVCscheme. It is noted that certain studies [26]–[29] proposevarious encoding algorithms to achieve various stacking resultsand contrasts, and therefore, the contrast is not unique. Thedefinition of the contrast follows (4). The proposed Opt-PrVC scheme is a generalized scheme for arbitrary , and thecontrast is optimal under the definition of Ito et al. [2]. In orderto give a detailed comparison, Table V shows the RGproposed by Chen and Tsao [29]. As stated in [29], for a whitesecret pixel white, we have ,

TABLE IVCOMPARISONS OF THE OPTPRVC SCHEME WITH RGS

TABLE VENCODING ALGORITHM OF RG SCHEME PROPOSED BY

CHEN AND TSAO [29]

and , ; and forblack, we have , and

, . The probabilitiesare identical to Algorithm 1 for . Thus, the RG [29]performs the same distribution in generating transparenciesthrough the Algorithm 1 for ; and based on the observa-tion, the proposed OptPrVC scheme is also a generalizedversion of RG for general and unlimited .

V. CONCLUSION

We have proposed a VC scheme with flexible valueof . From the practical perspective, the proposed scheme ac-commodates the dynamic changes of users without regeneratingand redistributing the transparencies, which reduces computa-tion and communication resources required in managing the dy-namically changing user group. From the theoretical perspec-tive, the scheme can be considered as the probabilistic modelof VC with unlimited . Initially, the proposed scheme isbased on basis matrices, but the basis matrices with infinite sizecannot be constructed practically. Therefore, the probabilistic

http://ieeexploreprojects.blogspot.com

Page 11: A probabilistic model of visual cryptography scheme with dynamic group.bak

LIN AND CHUNG: PROBABILISTIC MODEL OF VC SCHEME WITH DYNAMIC GROUP 207

model is adopted in the scheme. As the results listed in Table I,the proposed scheme also provides the alternate verification forthe lower bound proved by Krause and Simon [20]. For ,the contrast is very low so that the secret is visually insignif-icant. Therefore, in practical applications, the values of 2 or 3for are empirically suggested for the proposed scheme.

REFERENCES[1] M. Naor and A. Shamir, “Visual cryptography,” in Proc. Advances in

Cryptography (EUROCRYPT’94), 1995, vol. 950, LNCS, pp. 1–12.[2] R. Ito, H. Kuwakado, and H. Tanaka, “Image size invariant visual cryp-

tography,” IEICE Trans. Fundam. Electron., Commun., Comput. Sci.,vol. 82, pp. 2172–2177, Oct. 1999.

[3] C. N. Yang, “New visual secret sharing schemes using probabilisticmethod,” Pattern Recognit. Lett., vol. 25, pp. 481–494, Mar. 2004.

[4] S. J. Lin, S. K. Chen, and J. C. Lin, “Flip visual cryptography (FVC)with perfect security, conditionally-optimal contrast, and no expan-sion,” J. Vis. Commun. Image Represent., vol. 21, pp. 900–916, Nov.2010.

[5] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, “Visual cryp-tography for general access structures,” Inf. Computat., vol. 129, no. 2,pp. 86–106, Sep. 1996.

[6] F. Liu, C. Wu, and X. Lin, “Step construction of visual cryptographyschemes,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 27–38,Mar. 2010.

[7] Z. Zhou, G. R. Arce, and G. Di Crescenzo, “Halftone visual cryptog-raphy,” IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453,Aug. 2006.

[8] Z. Wang, G. R. Arce, and G. Di Crescenzo, “Halftone visual cryptog-raphy via error diffusion,” IEEE Trans. Inf. Forensics Security, vol. 4,no. 3, pp. 383–396, Sep. 2009.

[9] F. Liu, C. K.Wu, and X. J. Lin, “Colour visual cryptography schemes,”IET Inf. Security, vol. 2, no. 4, pp. 151–165, Dec. 2008.

[10] G. Horng, T. Chen, and D. S. Tsai, “Cheating in visual cryptography,”Designs, Codes, Cryptography, vol. 38, no. 2, pp. 219–236, Feb. 2006.

[11] C. M. Hu and W. G. Tzeng, “Cheating prevention in visual cryptog-raphy,” IEEE Trans. Image Process., vol. 16, no. 1, pp. 36–45, Jan.2007.

[12] H. Koga, “A general formula of the -threshold visual secretsharing scheme,” in Proc. 8th Int. Conf. Theory and Application ofCryptology and Information Security: Advances in Cryptology, Dec.2002, pp. 328–345.

[13] R. Z. Wang, “Region incrementing visual cryptography,” IEEE SignalProcess. Lett., vol. 16, no. 8, pp. 659–662, Aug. 2009.

[14] M. Bose and R. Mukerjee, “Optimal visual cryptographicschemes for general ,” Designs, Codes, Cryptography, vol. 55, no. 1,pp. 19–35, Apr. 2010.

[15] C. Blundo, P. D’Arco, A. De Santis, and D. R. Stinson, “Contrast op-timal threshold visual cryptography schemes,” SIAM J. Discrete Math.,vol. 16, no. 2, pp. 224–261, Feb. 2003.

[16] M. Bose and R. Mukerjee, “Optimal visual cryptographicschemes,” Designs, Codes, Cryptography, vol. 40, no. 3, pp. 255–267,Sep. 2006.

[17] C. Blundo, A. De Santis, and D. R. Stinson, “On the contrast in visualcryptography schemes,” J. Cryptology, vol. 12, no. 4, pp. 261–289,1999.

[18] S. Cimato, R. De Prisco, and A. De Santis, “Optimal colored thresholdvisual cryptography schemes,”Designs, Codes, Cryptography, vol. 35,no. 3, pp. 311–335, Jun. 2005.

[19] T. Hofmeister, M. Krause, and H. U. Simon, “Contrast-optimal out ofsecret sharing schemes in visual cryptography,” Theoretical Comput.

Sci., vol. 240, no. 2, pp. 471–485, Jun. 2000.[20] M. Krause and H. U. Simon, “Determining the optimal contrast for

secret sharing schemes in visual cryptography,” Combinatorics, Prob-ability, Comput., vol. 12, no. 3, pp. 285–299, May 2003.

[21] E. R. Verheul and H. C. A. Van Tilborg, “Constructions and propertiesof out of visual secret sharing schemes,” Designs, Codes, Cryp-tography, vol. 11, no. 2, pp. 179–196, May 1997.

[22] P. A. Eisen and D. R. Stinson, “Threshold visual cryptographyschemes with specified whiteness levels of reconstructed pixels,”Designs, Codes, Cryptography, vol. 25, no. 1, pp. 15–61, 2002.

[23] F. Liu, C. K. Wu, and X. J. Lin, “A new definition of the contrast ofvisual cryptography scheme,” Inf. Process. Lett., vol. 110, no. 7, pp.241–246, Mar. 2010.

[24] C. Blundo, S. Cimato, and A. De Santis, “Visual cryptography schemeswith optimal pixel expansion,” Theoretical Comput. Sci., vol. 369, no.1, pp. 169–182, Dec. 2006.

[25] H. Hajiabolhassan and A. Cheraghi, “Bounds for visual cryptographyschemes,” Discrete Appl. Math., vol. 158, no. 6, pp. 659–665, Mar.2010.

[26] O. Kafri and E. Keren, “Encryption of pictures and shapes by randomgrids,” Opt. Lett., vol. 12, no. 6, pp. 377–379, Jun. 1987.

[27] S. J. Shyu, “Image encryption by random grids,” Pattern Recognit.,vol. 40, no. 3, pp. 1014–1031, Mar. 2007.

[28] S. J. Shyu, “Image encryption by multiple random grids,” PatternRecognit., vol. 42, no. 7, pp. 1582–1596, Jul. 2009.

[29] T. H. Chen and K. H. Tsao, “Visual secret sharing by random gridsrevisited,” Pattern Recognit., vol. 42, no. 9, pp. 2203–2217, Sep. 2009.

[30] N. Macon and A. Spitzbart, “Inverses of Vandermonde matrices,”Amer. Math. Monthly, vol. 65, no. 2, pp. 95–100, Feb. 1958.

[31] C. N. Yang, “New visual secret sharing schemes using probabilisticmethod,” Pattern Recognit. Lett., vol. 25, no. 4, pp. 481–494, Mar.2004.

[32] S. Cimato, R. De Prisco, and A. De Santis, “Probabilistic visual cryp-tography schemes,” Computer J., vol. 49, no. 1, pp. 97–107, Jan. 2006.

[33] G. B. Horng, T. G. Chen, and D. S. Tsai, “Cheating in visual cryp-tography,” Designs, Codes, Cryptography, vol. 38, no. 2, pp. 219–236,Feb. 2006.

Sian-Jheng Linwas born in Taiwan. He received theB.S., M.S., and Ph.D. degrees in computer sciencefrom National Chiao Tung University, in 2004, 2006,and 2010, respectively.He is currently a postdoctoral fellow with the Re-

search Center for Information Technology Innova-tion, Academia Sinica. His recent research interestsinclude data hiding, error control coding, and secretsharing.

Wei-Ho Chung (M’11) was born in Kaohsiung,Taiwan, in 1978. He received the B.Sc. and M.Sc.degrees in electrical engineering from NationalTaiwan University, Taipei City, Taiwan, in 2000and 2002, respectively, and the Ph.D. degree in theElectrical Engineering Department, University ofCalifornia, Los Angeles (UCLA), in 2009.From 2002 to 2005, he was a system engineer at

ChungHwa TeleCommunications Company. From2007 to 2009, he was a Teaching Assistant at UCLA.In 2008, he was a research intern working on CDMA

systems in Qualcomm Inc. Since January 2010, he has been a faculty memberholding the position of assistant research fellow in the Research Center forInformation Technology Innovation, Academia Sinica, Taiwan. His researchinterests include wireless communications, signal processing, statistical detec-tion and estimation theory, and networks.Dr. Chung received the Taiwan Merit Scholarship, sponsored by the National

Science Council of Taiwan, from 2005 to 2009.

http://ieeexploreprojects.blogspot.com