AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES

被引:0
|
作者
Askari, N. [1 ]
Heys, H. M. [1 ]
Moloney, C. R. [1 ]
机构
[1] Mem Univ Newfoundland, Fac Engn & Appl Sci, St John, NF A1C 5S7, Canada
关键词
cryptography; image processing; visual cryptography; secret sharing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Visual cryptography is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed. In extended visual cryptography, the share images are constructed to contain meaningful cover images, thereby providing opportunities for integrating visual cryptography and biometric security techniques. In this paper, we propose a method for processing halftone images that improves the quality of the share images and the recovered secret image in an extended visual cryptography scheme for which the size of the share images and the recovered image is the same as for the original halftone secret image. The resulting scheme maintains the perfect security of the original extended visual cryptography approach.
引用
收藏
页码:286 / 291
页数:6
相关论文
共 50 条
  • [41] Improving Multi-pixel Visual Quality of Invariant Visual Cryptography Scheme
    Wafy, Maged
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2024, 17 (01)
  • [42] Visual Secret Sharing Without Pixel Expansion
    Sagheer, Ali Makki
    Abed, Laith Hamid
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2015, 7 (02) : 20 - 30
  • [43] Extended visual cryptography techniques for true color images
    Dhiman, Kirti
    Kasana, Singara Singh
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 70 : 647 - 658
  • [44] Halftone visual cryptography through error diffusion
    Wang, Zhongmin
    Arce, Gonzalo R.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 109 - +
  • [45] Improved Halftone Visual Cryptography by Random Grids
    Liang, Zhuoqian
    Yang, Meihua
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 163 - 170
  • [46] Halftone Visual Cryptography Via Error Diffusion
    Wang, Zhongmin
    Arce, Gonzalo R.
    Di Crescenzo, Giovanni
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (03) : 383 - 396
  • [47] A copyright protection scheme of images based on visual cryptography
    Chang, CC
    Wu, HC
    [J]. IMAGING SCIENCE JOURNAL, 2001, 49 (03): : 141 - 150
  • [48] Shift visual cryptography scheme of two secret images
    WANG Daoshun
    2. Chengdu Institute of Computer Applications
    3. School of Information Science and Technology
    [J]. Progress in Natural Science:Materials International, 2003, (06) : 59 - 65
  • [49] Shift visual cryptography scheme of two secret images
    Wang, DS
    Luo, P
    Yang, L
    Qi, DX
    Dai, YQ
    [J]. PROGRESS IN NATURAL SCIENCE-MATERIALS INTERNATIONAL, 2003, 13 (06) : 457 - 463
  • [50] Curvelet transform based robust copyright protection scheme for color images using extended visual cryptography
    Sonal Kukreja
    Geeta Kasana
    Singara Singh Kasana
    [J]. Multimedia Tools and Applications, 2020, 79 : 26155 - 26179