Channels ▼


Visual Cryptography and Bit-Plane Complexity Segmentation

Source Code Accompanies This Article. Download It Now.

The Model

A possible scenario for the proposed model involves a "dealer" and "participants" to the scheme. The dealer chooses a secret message represented as a binary black-and-white image and applies a (2,2) visual-cryptography scheme on the secret message, obtaining the two corresponding shares. Every share is individually embedded into an 8-bit grayscale image (traditionally called a "vessel") using the modified BPCS scheme. Finally, the dealer electronically sends the images with embedded data to the participants. Participants process the received image (also based on the modified BPCS scheme), obtain the embedded share as a binary image, and print the binary image on a transparency. As soon as the participants come together, they can visually reconstruct the secret message by carefully superimposing the two transparencies.

This model follows the block diagram in Figure 4. Though separated in practice, for simplicity, Figure 4 illustrates the embed/extract process together: only the steganographic method for an 8-bit grayscale image is treated. Figure 5 presents a general view considering the modality the data is embedded into the vessels.

[Click image to view at full size]

Figure 4: The applied model.

[Click image to view at full size]

Figure 5: (a) Venice, original image; (b) roses, original image; (c) Venice, with embedded information; (d) roses, with embedded information; (e) difference between (a) and (c); (f) difference between (b) and (d).

Related Reading

More Insights

Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.