An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms

被引:0
|
作者
Wang, Huan [1 ]
Jiang, Zhongyuan [1 ]
Qian, Qing [1 ]
Wang, Hong [1 ]
机构
[1] Guizhou Univ Finance & Econ, Guiyang, Peoples R China
基金
中国国家自然科学基金;
关键词
Visual cryptography; lossless reconfiguration; XOR operation; pixel expansion; contrast; SECRET SHARING SCHEMES;
D O I
10.1177/15501329221084223
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article proposes an efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms, which includes an encryption and a decryption schemes for gray-scale and color secret images. The encryption scheme aims to encrypt secret images by mapping them to several shared images that do not suffer any pixel expansion problem and do not reveal any information of the secret images by considering a random column selection algorithm based on the 0-mapping and 1-mapping matrices, where the two matrices are dynamically generated in the encryption scheme. Moreover, the proposed decryption scheme can reconstruct the secret images with only a series of XOR operations. The reconstructed images do not suffer any contrast distortion and pixel expansion problems comparing with their original secret images. Finally, the proposed two schemes are illustrated with the practical examples.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] XOR-based frame loss recovery scheme for video streaming
    Chang, Ching-Lung
    Chang, Yue-Shan
    Chang, Ching-Hung
    Chen, Fang-Jie
    COMPUTER COMMUNICATIONS, 2011, 34 (10) : 1195 - 1201
  • [42] XOR-Based Low-Cost Reconfigurable PUFs for IoT Security
    Liu, Weiqiang
    Zhang, Lei
    Zhang, Zhengran
    Gu, Chongyan
    Wang, Chenghua
    O'Neill, Maire
    Lombardi, Fabrizio
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2019, 18 (03)
  • [43] A Lossless Secret Image Sharing Scheme based on Bit Sharing Visual Cryptography
    Rao, Kanusu Srinivasa
    Sridhar, Mandapati
    2018 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ELECTRICAL, ELECTRONICS & COMMUNICATION ENGINEERING (ICRIEECE 2018), 2018, : 1417 - 1420
  • [44] TAR-CAU: An XOR-Based Data Update Scheme
    Xiao Y.
    Zhou S.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2023, 52 (05): : 773 - 779
  • [45] A Master Share (2, n) XOR based Visual Cryptography Scheme by Random Grids
    Ahammed, Farzin T.
    Sulaiman, M. K.
    2015 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION & COMPUTING INDIA (ICCC), 2015, : 528 - 533
  • [46] Modeling efficient XOR-based hash functions for cache memories
    Cho, Sung-Jin
    Choi, Un-Sook
    Hwang, Yoon-Hee
    Kim, Han-Doo
    COMPUTATIONAL SCIENCE - ICCS 2006, PT 1, PROCEEDINGS, 2006, 3991 : 1067 - 1070
  • [47] Security enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful shares
    Wu, Xi-Wen
    Chen, Tzung-Her
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (10) : 28913 - 28926
  • [48] A noise-tolerant matchline scheme with XOR-based conditional keeper for energy-efficient TCAM
    Hua, Chung-Hsien
    Peng, Chi-Wei
    Hwang, Wei
    2006 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, PROCEEDINGS, 2006, : 971 - 974
  • [49] Polynomial Ring Transforms for Efficient XOR-based Erasure Coding
    Detchart, Jonathan
    Lacan, Jerome
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 604 - 608
  • [50] Efficient, XOR-Based, Ideal (t,n) - threshold Schemes
    Chen, Liqun
    Laing, Thalia M.
    Martin, Keith M.
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 467 - 483