Image Hatching for Visual Cryptography

被引:7
|
作者
Weir, Jonathan [1 ]
Yan, Weiqi [1 ]
Kankanhalli, Mohan S. [2 ]
机构
[1] Queens Univ Belfast, Inst ECIT, Belfast BT3 9DT, Antrim, North Ireland
[2] Natl Univ Singapore, Singapore 117548, Singapore
关键词
Security; Verification; Cryptography; visual cryptography; image hatching; data encryption; structural similarity; SECRET SHARING SCHEMES; MULTIPLE SECRETS; ILLUSTRATIONS;
D O I
10.1145/2344436.2344438
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image hatching (or nonphotorealistic line-art) is a technique widely used in the printing or engraving of currency. Diverse styles of brush strokes have previously been adopted for different areas of an image to create aesthetically pleasing textures and shading. Because there is no continuous tone within these types of images, a multilevel scheme is proposed, which uses different textures based on a threshold level. These textures are then applied to the different levels and are then combined to build up the final hatched image. The proposed technique allows a secret to be hidden using Visual Cryptography (VC) within the hatched images. Visual cryptography provides a very powerful means by which one secret can be distributed into two or more pieces known as shares. When the shares are superimposed exactly together, the original secret can be recovered without computation. Also provided is a comparison between the original grayscale images and the resulting hatched images that are generated by the proposed algorithm. This reinforces that the overall quality of the hatched scheme is sufficient. The Structural SIMilarity index (SSIM) is used to perform this comparison.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Image Hatching for Visual Cryptography
    Weir, Jonathan
    Yan, Wei-Qi
    [J]. 2009 13TH INTERNATIONAL MACHINE VISION AND IMAGE PROCESSING CONFERENCE, 2009, : 59 - 64
  • [2] Image size invariant visual cryptography
    Ito, R
    Kuwakado, H
    Tanaka, H
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (10) : 2172 - 2177
  • [3] Hierarchical Visual Cryptography for Grayscale Image
    Patel, Trupti
    Srivastava, Rohit
    [J]. PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [4] Repeating image watermarking technique by the visual cryptography
    Wang, CC
    Tai, SC
    Yu, CS
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (08) : 1589 - 1598
  • [5] Color image hiding with invisible visual cryptography
    Shen, Xiaoshuang
    Zhang, Xinyu
    Zhu, Yupeng
    Mi, Zhaoke
    Zhu, Yusi
    Ke, Changjun
    Shi, Yishi
    [J]. APPLIED OPTICS, 2024, 63 (21) : 5578 - 5587
  • [6] Enhancing Image Quality in Visual Cryptography with Colors
    Hsiao, Chun-Yuan
    Wang, Hao-Ji
    [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND INTELLIGENT CONTROL (ISIC 2012), 2012, : 103 - 106
  • [7] Visual Cryptography Scheme for Secret Image Retrieval
    Reddy, M. Sukumar
    Mohan, S. Murali
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (06): : 41 - 46
  • [8] Visual Cryptography using Image Pixel Transparency with Cover Image
    Shrestha, Dipesh
    Panday, Sanjeeb Prasad
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT AND APPLICATIONS (SKIMA), 2015,
  • [9] Visual Cryptography for Image Privacy protection using Diverse Image media
    Rao, Jyoti
    Patil, Vikram
    [J]. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 855 - 859
  • [10] A REVIEW ON METHODS FOR IMAGE AUTHENTICATION AND VISUAL CRYPTOGRAPHY IN DIGITAL IMAGE WATERMARKING
    Vyas, Chinmay
    Lunagaria, Munindra
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1191 - 1196