A Fast and Hardware-Efficient Visual Cryptography Scheme for Images

被引:0
|
作者
Vaya, Dipesh [1 ]
Khandelwal, Sarika [1 ]
机构
[1] Geetanjali Inst Tech Studies, Dept Comp Sci & Engn, Udaipur, India
关键词
Secret sharing; Lossless reveal; Shadow images; Shamir's encryption technique;
D O I
10.1007/978-81-322-2517-1_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Shamir's encryption method is to share a secret image by n number of shadow images and then r shadow images can be used to obtain the original secret image. In proposed method, the size of secret image is greater than the size of the shadow image used for the encryption. Such shadow image is beneficial to process in image hiding, transmission, or storage. For this purpose Shamir's encryption technique is used in this proposed work. In Shamir's encryption technique, author used the equation to encrypt the data into multiple parts. In the equation, time required for the multiplication and division of the input components of the data is more than addition and subtraction. Hence, the encryption time is little bit high. To reduce this encryption and decryption time, Shamir's equation is modified by converting all the multiplication part into addition and division parts into subtraction in this proposed work.
引用
收藏
页码:133 / 142
页数:10
相关论文
共 50 条
  • [21] Hardware-Efficient Belief Propagation
    Liang, Chia-Kai
    Cheng, Chao-Chung
    Lai, Yen-Chieh
    Chen, Liang-Gee
    Chen, Homer H.
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2011, 21 (05) : 525 - 537
  • [22] EXTENDED VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGES WITH NO PIXEL EXPANSION
    Wu, Xiaoyu
    Wong, Duncan S.
    Li, Qing
    [J]. SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 423 - 426
  • [23] Wavelet compression based on scheme of visual cryptography for binary images
    An, Shao-Jun
    [J]. Zhongshan Daxue Xuebao/Acta Scientiarum Natralium Universitatis Sunyatseni, 2002, 41 (05):
  • [24] Threshold Visual Cryptography Scheme for Color Images with No Pixel Expansion
    Wu, Xiaoyu
    Wong, Duncan S.
    Li, Qing
    [J]. PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 310 - 315
  • [25] Protecting Medical Images in Cloud Using Visual Cryptography Scheme
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    [J]. PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 39 - 44
  • [26] Hardware-Efficient Learning with Feedforward Inhibition
    Xu, Zihan
    Chen, Pai-Yu
    Seo, Jae-sun
    Yu, Shimeng
    Cao, Yu
    [J]. 7TH IEEE INTERNATIONAL NANOELECTRONICS CONFERENCE (INEC) 2016, 2016,
  • [27] Hardware-efficient and fast three-qubit gate in superconducting quantum circuits
    Li, Xiao-Le
    Tao, Ziyu
    Yi, Kangyuan
    Luo, Kai
    Zhang, Libo
    Zhou, Yuxuan
    Liu, Song
    Yan, Tongxing
    Chen, Yuanzhen
    Yu, Dapeng
    [J]. FRONTIERS OF PHYSICS, 2024, 19 (05)
  • [28] Improving the visual quality of a size deterministic visual cryptography scheme for Grayscale Images
    Kumar, Ankit
    Kumar, Ashutosh
    Khandelwal, Girraj
    Bhardwaj, Yogesh
    Sharma, Vivek Kumar
    Sharma, Gajanand
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (04): : 1113 - 1123
  • [29] Accurate Hardware-Efficient Logarithm Circuit
    Ha, Minho
    Lee, Sunggu
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2017, 64 (08) : 967 - 971
  • [30] A Hardware-Efficient BCH Encoder Design
    Hsieh, Jui-Hung
    Hung, King-Chu
    Li, Hong-chi
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN (ICCE-TW), 2016, : 367 - 368