of the corresponding pixel in the i-th mean-
ingful image is in the k
i
X
-th group (where
0 ≤ k
i
X
≤ M
i
X
− 1 and 1 ≤ i ≤ n), we com-
pute a probability value Q
i
X
= k
i
X
/(M
i
X
−1).
We then set the ∗ in the i-th row of the gen-
eral form A
c
1
,...,c
n
to 0 with the probability
Q
i
X
and to 1 with the probability 1-Q
i
X
and
randomly choose a column from it.
• Consider the column chosen as an n-bit vec-
tor. For the first bit, we assign the black color
(i.e. 0 color intensity) if the bit is 1, otherwise
we assign X primary color (i.e. 255 color in-
tensity) to the correpsonding pixel in the first
share image. This continues until we have as-
signed colors to the corresponding pixel on all
the n share images.
(c) With the probability 1− P, we carry out similar
steps to the above, but change B
0
to B
1
.
3. Finally, we superimpose the i-th R share with the
i-th G share and the i-th B share, for i = 1,...,n,
to form the final i-th color share image.
4 DETERMINING THE NUMBER
OF COLOR LEVELS
In this section, we discuss how to choose the number
of color levels (i.e. N = N
R
× N
G
× N
B
) in the recon-
structed secret image and the share images. As the
scheme allows a user to arbitrarily choose the number
of color levels, we observe that the number of color
levels has a significant impact on the quality of the
reconstructed image and the share images. The num-
ber of color levels should be chosen depending on the
number of colors of the original n+ 1 images. In the
following, we take the reconstructed image as an ex-
ample.
We first identify the secret image as belonging to
one of the following two categories: in category 1, the
number of levels of a particular primary color is small,
for example, less than 4; and in category 2, the num-
ber is large, say at least 4. For images in category 1, if
the image on a particular primary color X ∈ {R,G, B}
is OriginalN
X
, since OriginalN
X
in this case is small,
there is no need to try with different color levels. We
should just set N
X
to OriginalN
X
. Images that fall into
this category could be texts or logos. Figure 4 and
Figure 5 show the images of text, their corresponding
shares and the reconstructed image (Lena) for the case
of 2-out-of-2 EVCS, N
R
= N
G
= N
B
= M
i
R
= M
i
G
=
M
i
B
= 2 (where i = 1,2).
For images in category 2, one may try the color
level N
X
from a small value, say 2 or 4, to the “full”
Figure 4: The images of the text.
Figure 5: The two shares and the reconstructed image of the
text.
level, i.e. OriginalN
X
. Based on our experimental
results, we observe that for photos or color cartoon
images with large number of color levels, trying these
three values (namely 2, 4 or OriginalN
X
) for the value
of N
X
can already attain one of the best results in the
reconstructed images.
REFERENCES
Ateniese, G., Blundo, C., Santis, A. D., and Stinson, D. R.
(1996). Visual cryptography for general access struc-
tures. Inf. Comput., 129(2):86–106.
Nakajima, M. and Yamaguchi, Y. (2002). Extended visual
cryptography for natural images. Journal of WSCG,
10(2):303–310.
Naor, M. and Shamir, A. (1994). Visual cryptography. In
Advances in Cryptology - EUROCRYPT ’94, pages 1–
12. Lecture Notes in Computer Science, Vol. 950.
Sirhindi, R., Afzal, M., and Murtaza, S. (2009). An ex-
tended secret sharing scheme for colour images with
fixed pixel expansion. International Journal of Elec-
tronic Security and Digital Forensics, 2(1):58–67.
Wang, D., Yi, F., and Li, X. (2009). On general construc-
tion for extended visual cryptography schemes. Pat-
tern Recognition, 42(11):3071–3082.
Yang, C. N. (2004). New visual secret sharing schemes us-
ing probabilistic method. Pattern Recognition Letters,
25(4):481–494.
SECRYPT 2010 - International Conference on Security and Cryptography
426