Controlled-Adaptable Distributed Data and File Sharing with Multiple Participants in Visual Cryptography

(*) Corresponding author

Authors' affiliations

DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)


With fast growth in Internet and digital imaging knowledge, there are progressive customs to simply generate, distribute and allocate the images. Measured the association among digital imaging and privacy fortification, Visual Cryptography and Secret Image Sharing is an inclusive preamble to original security methods. The secret sharing control system is used to guard unauthorized data access and to secure distribution of responsive information. An efficient color image visual cryptic filtering scheme is to improve the image quality on restored original image from visual cryptic shares. The color image visual cryptic filtering scheme presents a deblurring effect on the non-uniform distribution of visual cryptic share pixels. Fourier transformation and texture overlapping is applied to normalize the unevenly transformed share pixels on the original restored image. This in turn improves the quality of restored visual cryptographic image to its optimality. The privacy preservation in visual cryptography plays a major role to provide an efficient secure communication for the users. To address data sharing issues more sensitively, a privacy preservation achieved by using cache-cache mechanism. The cache-cache mechanism maintains a cache inside a cache to preserve the details about the users who shared the secret parts of digital document, which has been splitted in a scheme of visual cryptography. In this work, the binary spanning trees are used to enhance the progress of secure distributed file sharing in visual cryptography. Privacy of file sharing is done with file block id relating to the participant id using binary trees. Group dynamics is handled effectively with distributed key exchange model, based on the principal operation of minimum spanning tree variants. Experimentation carried out with bench mark data sets of real and synthetically generated data sets to estimate the performance of the proposed controlled adaptable distributed file sharing with multiple participants in visual cryptography in terms of group dynamic rate, tree spanning length and privacy overhead.
Copyright © 2013 Praise Worthy Prize - All rights reserved.


Binary Spanning Tree; Cache-Cache Mechanism; Context Overlapping; Digital Document; Fourier Filtering; Privacy Preservation; Visual Cryptography

Full Text:



M. Naor and A. Shamir, Visual Cryptography, in “Advanced in Cryptology – EUROCRYPT’94”, A. De. Santis, Ed., Vol. 950 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, PP. 1-12,1995.

G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Visual cryptographyfor general access structures,” Inf. Comput., vol. 129, no. 2, pp. 86–106, 1996.

G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, Extended Schemes for Visual Cryptography, submitted to Discrete Mathematics, 1996.

L. A. MacPherson, “Gray level visual cryptography for general access structrue,” M. Eng. thesis, Univ. Waterloo, Ontario, Canada, 2000.

G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, “Extended Schemes for Visual Cryptography”. Theoretical Computer Science, No. 250, pp. 143-161, 2001.

M. Nakajima and Y. Yamaguchi, “Extended visual cryptography for natural images,” J. WSCG, vol. 10, no. 2, 2002.

C. C. Lin and W. H. Tsai, “Visual cryptography for gray-level images by dithering techniques,” Pattern Recognit. Lett., vol. 24, pp. 349–358, 2003.

D. Jin, W. Q. Yan, and M. S. Kankanhalli, “Progressive color visual cryptography,” J. Electron. Imag., vol. 14, no. 3, p. 033019, 2005.

C. N. Yang and T. S. Chen, “Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion,” Pattern Recogniti. Lett., vol.26, pp. 193–206, 2005.

Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography,” IEEE Trans. Image Process., vol. 18, no. 8, pp. 2441–2453, 2006.

Soo-Chang Pei et. Al.,’ High-capacity data hiding in halftone images using minimal-error bit searching and least-mean square filter’, IEEE Transactions on Image Processing, 2006.

Wang,C. Xiao, L. et. Al., “DiCAS: An Efficient Distributed Caching Mechanism for P2P Systems”, IEEE Transactions on Parallel and Distributed Systems, Volume: 17 , Issue: 10 , oct., 2006.

W. He, X. Liu, H. Nguyen, K. Nahrstedt and T. Abdelzaher, “PDA: Privacy-preserving Data Aggregation in Wireless Sensor Networks,” In 26th IEEE International Conference on Computer Communications (Infocom), 2007.

D.S. Tsai, T.H. Chen, G. Horng, “A Cheating Prevention Scheme for Binary Visual Cryptography with Homogeneous Secret Images,” Pattern Recognition, Vol. 40, No. 8, pp. 2356-2366, 2007.

S. A. M. Gilani, A. N. Skodras,” Adaptive Image Watermarking Using Multiple Transforms”,International Review on Computers and Softwares, Vol. 2. n. 6, pp. 653 – 660, Nov 2007.

Kharbutli, M., Yan Solihin et. Al., “Counter-Based Cache Replacement and Bypassing Algorithms”, IEEE Transactions on Computers, Volume: 57 , Issue: 4 , 2008

T. Feng, C. Wang, W. Wang and L. Ruan, “Confidentiality Protection for Distributed Sensor Data Aggregation,” In 27th IEEE International Conference on Computer Communications (Infocom), 2008.

W. Zhang, C. Wang and T. Feng, “GP2S: Generic Privacy-Preservation Solutions for Approximation Aggregation of Sensor Data,” In 6th Annual IEEE International Conference of Pervasive Computing and Communications 2008.

Shi, Runhua et. Al., “A (t, n) Secret Sharing Scheme for Image Encryption”, Congress on Image and Signal Processing, 2008.

Zhen He.,‟Hierarchical Error Diffusion”, IEEE Transactions on image processing, Vol. 18, No. 7, pp. 1524-1534, 2009.

Hai Vu_, Thuc Nguyen et. Al., ‘PEQ: A Privacy-preserving Scheme for Exact Query Evaluation in Distributed Sensor Data Networks’, 28th IEEE International Symposium on Reliable Distributed Systems, 2009.

Chin-Chen Chang et. Al., ‘Self-Verifying Visual Secret Sharing Using Error Diffusion and Interpolation Techniques’, IEEE Transactions on Information Forensics and Security, 2009.

A. Sabri, M. Karoud, H. Tairi, A. Arab,” A Robust Image Watermarking Based on the Empirical Mode Decomposition”, International Review on Computers and Softwares, Vol. 4. n. 3, pp. 360 – 365, May 2009.

InKoo Kang, Member, IEEE, Gonzalo R. Arce, Fellow, IEEE, and Heung-Kyu Lee, Member, IEEE,” Color Extended Visual Cryptography Using Error Diffusion,” IEEE Transactions on Image processing, vol. 20, no. 1, 2011.

Dash, A. Demsky, B., “Integrating Caching and Pre fetching Mechanisms in a Distributed Transactional Memory”, IEEE Transactions on Parallel and Distributed Systems, Volume: 22 , Issue: 8 , 2011.

Khosravi, M.J., Ghandali, S., “ A secure joint wavelet based steganography and secret sharing method,” International Conference on Information Assurance and Security (IAS), 2011.

Daoshun Wang et.Al., “Towards Shift Tolerant Visual Secret Sharing Schemes”, IEEE Transactions on Information Forensics and Security, 2011.

Young-Chang Houet. Al., “Progressive Visual Cryptography with Unexpanded Shares”, IEEE Transactions on Circuits and Systems for Video Technology, 2011.

Yi Wang., Zheng Yuan., Zhican Li., Renfa Li., “Secret sharing based countermeasure for AES S-box,” International Symposium on Integrated Circuits (ISIC), 2011.

Wenxiu Duan,” A Simple Image Encryption Scheme Using Digital Watermarking Technology”, International Review on Computers and Softwares, Vol. 6 N. 7, pp. 1325-1328, December 2011.

Yingxi Xu, Chunling Gao, Zeyu Sun, Chuanfeng Li,” Improved Image Matching and Encryption Algorithm Based on Polar Transform and Fourier Transform”, International Review on Computers and Softwares, Vol. 7 N. 2(Part B), pp. 701-705, March 2012.

Che-Wei Lee ET. Al., „A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability“, IEEE Transactions on Image Processing, 2012.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2024 Praise Worthy Prize