Image Hatching for Visual Cryptography

被引:7
|
作者
Weir, Jonathan [1 ]
Yan, Weiqi [1 ]
Kankanhalli, Mohan S. [2 ]
机构
[1] Queens Univ Belfast, Inst ECIT, Belfast BT3 9DT, Antrim, North Ireland
[2] Natl Univ Singapore, Singapore 117548, Singapore
关键词
Security; Verification; Cryptography; visual cryptography; image hatching; data encryption; structural similarity; SECRET SHARING SCHEMES; MULTIPLE SECRETS; ILLUSTRATIONS;
D O I
10.1145/2344436.2344438
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image hatching (or nonphotorealistic line-art) is a technique widely used in the printing or engraving of currency. Diverse styles of brush strokes have previously been adopted for different areas of an image to create aesthetically pleasing textures and shading. Because there is no continuous tone within these types of images, a multilevel scheme is proposed, which uses different textures based on a threshold level. These textures are then applied to the different levels and are then combined to build up the final hatched image. The proposed technique allows a secret to be hidden using Visual Cryptography (VC) within the hatched images. Visual cryptography provides a very powerful means by which one secret can be distributed into two or more pieces known as shares. When the shares are superimposed exactly together, the original secret can be recovered without computation. Also provided is a comparison between the original grayscale images and the resulting hatched images that are generated by the proposed algorithm. This reinforces that the overall quality of the hatched scheme is sufficient. The Structural SIMilarity index (SSIM) is used to perform this comparison.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Privacy Preserving Data Mining using Image Slicing and Visual Cryptography
    Sah, Hare Ram
    Gunasekaran, G.
    [J]. 2015 6TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2015, : 256 - 262
  • [42] Secure visual cryptography for medical image using modified cuckoo search
    Begum, A. Alif Siddiqua
    Nirmala, S.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (20) : 27041 - 27060
  • [43] Visual Cryptography and Image Processing Based Approach for Bank Security Applications
    Pathak, Bageshree
    Pondkule, Darshana
    Shaha, Rasika
    Surve, Apurva
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 292 - 298
  • [44] Secure Authentication using Image Processing and Visual Cryptography for Banking Applications
    Hegde, Chetana
    Manu, S.
    Shenoy, P. Deepa
    Venugopal, K. R.
    Patnaik, L. M.
    [J]. ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 65 - +
  • [45] Security Enhancement in Image Steganography Using Neural Networks and Visual Cryptography
    Seethalakshmi, K. S.
    Usha, B. A.
    Sangeetha, K. N.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 396 - 402
  • [46] A highly robust and secure image watermarking based on classification and visual cryptography
    Fatahbeygi, Ali
    Tab, Fardin Akhlaghian
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 71 - 78
  • [47] WATERMARKING VIDEO CONTENT USING VISUAL CRYPTOGRAPHY AND SCENE AVERAGED IMAGE
    Vashistha, Aditya
    Nallusamy, Rajarathnam
    Das, Amitabha
    Paul, Sanjoy
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2010), 2010, : 1641 - 1646
  • [48] Visual Cryptography and Image Steganography using Space Filling Hilbert Curves
    Sheidaeian, Hamed
    Abbasifard, Mohammad Reza
    Zolfaghari, Behrouz
    [J]. 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING ( ICACTE 2011), 2011, : 763 - 767
  • [49] Enhanced Security Architecture for Visual Cryptography Based on Image Secret Sharing
    Gundapuneni, Manas Abhilash
    Bano, Anzum
    Singh, Navjot
    [J]. 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 749 - 755
  • [50] Voronoi-based image representation applied to binary visual cryptography
    Melkemi, Mahmoud
    Hammoudi, Karim
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2020, 87 (87)