AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES

被引:0
|
作者
Askari, N. [1 ]
Heys, H. M. [1 ]
Moloney, C. R. [1 ]
机构
[1] Mem Univ Newfoundland, Fac Engn & Appl Sci, St John, NF A1C 5S7, Canada
关键词
cryptography; image processing; visual cryptography; secret sharing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Visual cryptography is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed. In extended visual cryptography, the share images are constructed to contain meaningful cover images, thereby providing opportunities for integrating visual cryptography and biometric security techniques. In this paper, we propose a method for processing halftone images that improves the quality of the share images and the recovered secret image in an extended visual cryptography scheme for which the size of the share images and the recovered image is the same as for the original halftone secret image. The resulting scheme maintains the perfect security of the original extended visual cryptography approach.
引用
收藏
页码:286 / 291
页数:6
相关论文
共 50 条
  • [1] EXTENDED VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGES WITH NO PIXEL EXPANSION
    Wu, Xiaoyu
    Wong, Duncan S.
    Li, Qing
    [J]. SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 423 - 426
  • [2] Visual cryptography for color images without pixel expansion
    Hou, YC
    Chang, CY
    Hsu, CS
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON IMAGING SCIENCE, SYSTEMS AND TECHNOLOGY, VOLS I AND II, 2001, : 239 - 245
  • [3] Threshold Visual Cryptography Scheme for Color Images with No Pixel Expansion
    Wu, Xiaoyu
    Wong, Duncan S.
    Li, Qing
    [J]. PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 310 - 315
  • [4] (2,3) RIVC Scheme in Visual Cryptography without Pixel Expansion
    Thankappan, Anila
    Wilscy, M.
    [J]. 2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 259 - 263
  • [5] Optimal pixel expansion of deterministic visual cryptography scheme
    Fu, Zhengxin
    Yu, Bin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 73 (03) : 1177 - 1193
  • [6] Optimal pixel expansion of deterministic visual cryptography scheme
    Zhengxin Fu
    Bin Yu
    [J]. Multimedia Tools and Applications, 2014, 73 : 1177 - 1193
  • [7] A (2,2) Secret Sharing Scheme for Visual Cryptography without Pixel Expansion
    Hodeish, Mahmoud E.
    Humbe, V. T.
    [J]. 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [8] A Kind of Visual Cryptography Scheme For Color Images Based on Halftone Technique
    Qiao, Wei
    Yin, Hongdong
    Liang, Huaqing
    [J]. 2009 INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, VOL I, 2009, : 393 - 395
  • [9] HALFTONE VISUAL CRYPTOGRAPHY FOR COLOR IMAGES
    Pahuja, Shivani
    Kasana, Singara Singh
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 281 - 285
  • [10] Multi-secret Visual Cryptography Sharing Scheme Using Rotation Without Pixel Expansion
    Han, Yanyan
    Ge, Xiaonan
    He, Wencai
    Liu, Chang
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND INTELLIGENT CONTROL (ISIC 2015), 2015, : 96 - 101