A Fast and Hardware-Efficient Visual Cryptography Scheme for Images

被引:0
|
作者
Vaya, Dipesh [1 ]
Khandelwal, Sarika [1 ]
机构
[1] Geetanjali Inst Tech Studies, Dept Comp Sci & Engn, Udaipur, India
关键词
Secret sharing; Lossless reveal; Shadow images; Shamir's encryption technique;
D O I
10.1007/978-81-322-2517-1_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Shamir's encryption method is to share a secret image by n number of shadow images and then r shadow images can be used to obtain the original secret image. In proposed method, the size of secret image is greater than the size of the shadow image used for the encryption. Such shadow image is beneficial to process in image hiding, transmission, or storage. For this purpose Shamir's encryption technique is used in this proposed work. In Shamir's encryption technique, author used the equation to encrypt the data into multiple parts. In the equation, time required for the multiplication and division of the input components of the data is more than addition and subtraction. Hence, the encryption time is little bit high. To reduce this encryption and decryption time, Shamir's equation is modified by converting all the multiplication part into addition and division parts into subtraction in this proposed work.
引用
收藏
页码:133 / 142
页数:10
相关论文
共 50 条
  • [1] Apodization Scheme for Hardware-Efficient Beamformer
    Ibrahim, A.
    Angiolini, F.
    Arditi, M.
    Thiran, J. -P.
    De Micheli, G.
    [J]. 2016 12TH CONFERENCE ON PH.D. RESEARCH IN MICROELECTRONICS AND ELECTRONICS (PRIME), 2016,
  • [2] A HARDWARE-EFFICIENT IMPLEMENTATION OF THE FAST AFFINE PROJECTION ALGORITHM
    Lo, Haw-Jing
    Anderson, David V.
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, : 581 - 584
  • [3] On the security of a visual cryptography scheme for color images
    Leung, Bert W.
    Ng, Felix Y.
    Wong, Duncan S.
    [J]. PATTERN RECOGNITION, 2009, 42 (05) : 929 - 940
  • [4] Algebraic visual cryptography scheme for color images
    Heidarinejad, Mohsen
    Yazdi, Amirhossein Alamdar
    Plataniotis, Konstantinos N.
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 1761 - 1764
  • [5] New Hardware-Efficient ML detection for Spatial Modulation Scheme
    Kim, Hongjoong
    Kim, Hojun
    Shang, Yulong
    Jung, Taejin
    [J]. 18TH IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS (ISCE 2014), 2014,
  • [6] A Hardware-efficient TSV Repair Scheme Based on Butterfly Topology
    Cheong, Minho
    Lim, Hyunyul
    Kim, Taehyun
    Kang, Sungho
    [J]. 2019 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2019, : 63 - 64
  • [7] Fast and Hardware-Efficient Variable Step Size Adaptive Beamformer
    Smriti, P.
    Bhure, Aroondhati
    Sahoo, Subhendu Kumar
    [J]. 2022 IEEE MICROWAVES, ANTENNAS, AND PROPAGATION CONFERENCE, MAPCON, 2022, : 557 - 562
  • [8] A high contrast and capacity efficient visual cryptography scheme for the encryption of multiple secret images
    Lee, Kai-Hui
    Chiu, Pei-Ling
    [J]. OPTICS COMMUNICATIONS, 2011, 284 (12) : 2730 - 2741
  • [9] An Efficient Tagged Visual Cryptography for Color Images
    Shiny, R. M.
    Jayalakshmi, P.
    Rajakrishnammal, A.
    Sivaprabha, T.
    Abirami, R.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH, 2016, : 791 - 794
  • [10] A copyright protection scheme of images based on visual cryptography
    Chang, CC
    Wu, HC
    [J]. IMAGING SCIENCE JOURNAL, 2001, 49 (03): : 141 - 150