• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology


Indian Journal of Science and Technology

Year: 2023, Volume: 16, Issue: 5, Pages: 357-366

Original Article

Half-Tone Visual Cryptography Scheme For RGB Color Images

Received Date:16 October 2022, Accepted Date:08 January 2023, Published Date:07 February 2023


Objectives: Currently used visual-cryptography methods which use binary and gray-level images have some shortcomings such as large pixel expansion, poor visual quality of the reconstructed image, etc. Further modifications in visualcryptography methods are required to provide error-free and better results. It has been observed that the use of color images is more convenient and accurate in approach. Method: This research study presents a new and optimal scheme for the visual-cryptography which is centered on RGB color images. Jarvis halftoning is applied on each decomposed color channel that is used in share generation. A special code matrix is defined for the generation of color shares and the optimal reconstruction of the original image. The method is tested with color images of different sizes, no specific dataset is required. Pixel Expansion, The Aspect Ratio, and Contrast of the method is compared with the existing method, and found more enhanced result. Findings: The scheme projected eliminates the problems of large pixel expansion and poor visual quality in the reconstructed images. The performance of the method is tested with the different statistical measures and values obtained as Mean Square Error (MSE):0, Peak- Signal-to-Noise-Ratio (PSNR): ¥, Universal Index Quality (UIQ):1, etc. This means that the original image is completely recovered with good contrast. Novelty: Color images of varied sizes and channels can be processed by applying the Jarvis half-toning technique through the codebook calculated to abolish the problems of pixel expansion and to improve the superiority of the renovated image.

Keywords: Color HalfTone Images; Error Diffusion; Optimal Contrast; Secret and Secure Sharing Scheme; Expansion of Pixels


  1. Naor M, Shamir A. Visual cryptography. In: DS, A., eds. Advances in Cryptology — EUROCRYPT'94. (Vol. 950, pp. 1-12) Springer Berlin Heidelberg. 1995.
  2. Ateniese G, Blundo C, Santis AD, Stinson DR. Visual Cryptography for General Access Structures. Information and Computation. 1996;129(2):86–106. Available from: https://doi.org/10.1006/inco.1996.0076
  3. Zhou Z, Arce GR, Crescenzo GD. Halftone visual cryptography. IEEE Transactions on Image Processing. 2006;15:2441–2453. Available from: https://doi.org/10.1109/TIP.2006.875249
  4. Hodeish ME, Humbe VT. An Optimized Halftone Visual Cryptography Scheme Using Error Diffusion. Multimedia Tools and Applications. 2018;77(19):24937–24953. Available from: https://doi.org/10.1007/s11042-018-5724-z
  5. Lin CC, Tsai WH. Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters. 2003;24(1-3):349–358. Available from: https://doi.org/10.1016/S0167-8655(02)00259-3
  6. Somwanshi DR, Humbe VT. A Secure and Verifiable Color Visual Cryptography Scheme with LSB Based Image Steganography. International Journal of Advanced Trends in Computer Science and Engineering. 2021;10(4):2669–2677. Available from: https://doi.org/10.30534/ijatcse/2021/031042021
  7. Sherine A, Peter G, Stonier AA, Praghash K, Ganji V. CMY Color Spaced-Based Visual Cryptography Scheme for Secret Sharing of Data. Wireless Communications and Mobile Computing. 2022;2022:1–12. Available from: https://doi.org/10.1155/2022/6040902
  8. Çiftci E, Sümer E. A novel steganography method for binary and color halftone images. PeerJ Comput Sci. 2022;8:1062. Available from: https://doi.org/10.7717/peerj-cs.1062
  9. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Transactions on Image Processing. 2004;13(4):600–612. Available from: https://doi.org/10.1109/TIP.2003.819861
  10. Hodeish ME, Bukauskas L, Humbe VT. An Optimal (k,n)Visual Secret Sharing Scheme for Information Security. Procedia Computer Science. 2016;93:760–767. Available from: https://doi.org/10.1016/j.procs.2016.07.288
  11. Liu F, Wu CK, Lin XJ. Colour visual cryptography schemes. IET Information Security. 2008;2(4):151. Available from: https://doi.org/10.1049/iet-ifs:20080066
  12. Wang Z, Arce GR, Crescenzo GD. Halftone Visual Cryptography Via Error Diffusion. IEEE Transactions on Information Forensics and Security. 2009;4(3):383–396. Available from: https://doi.org/10.1109/TIFS.2009.2024721


© 2023 Somwanshi & Humbe. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee)


Subscribe now for latest articles and news.