A Fast and Hardware-Efficient Visual Cryptography Scheme for Images

被引:0
|
作者
Vaya, Dipesh [1 ]
Khandelwal, Sarika [1 ]
机构
[1] Geetanjali Inst Tech Studies, Dept Comp Sci & Engn, Udaipur, India
关键词
Secret sharing; Lossless reveal; Shadow images; Shamir's encryption technique;
D O I
10.1007/978-81-322-2517-1_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Shamir's encryption method is to share a secret image by n number of shadow images and then r shadow images can be used to obtain the original secret image. In proposed method, the size of secret image is greater than the size of the shadow image used for the encryption. Such shadow image is beneficial to process in image hiding, transmission, or storage. For this purpose Shamir's encryption technique is used in this proposed work. In Shamir's encryption technique, author used the equation to encrypt the data into multiple parts. In the equation, time required for the multiplication and division of the input components of the data is more than addition and subtraction. Hence, the encryption time is little bit high. To reduce this encryption and decryption time, Shamir's equation is modified by converting all the multiplication part into addition and division parts into subtraction in this proposed work.
引用
收藏
页码:133 / 142
页数:10
相关论文
共 50 条
  • [31] A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography
    Tu, Shu-Fen
    Hsu, Ching-Sheng
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2012, 9 (03) : 276 - 283
  • [32] AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES
    Askari, N.
    Heys, H. M.
    Moloney, C. R.
    [J]. 2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 286 - 291
  • [33] A copyright protection scheme for digital images using visual cryptography technique
    Lou, Der-Chyuan
    Tso, Hao-Kuan
    Liu, Jiang-Lung
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 125 - 131
  • [34] Copyright protection scheme for color images using extended visual cryptography
    Kukreja, Sonal
    Kasana, Geeta
    Kasana, Singara Singh
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2021, 91
  • [35] A Kind of Visual Cryptography Scheme For Color Images Based on Halftone Technique
    Qiao, Wei
    Yin, Hongdong
    Liang, Huaqing
    [J]. 2009 INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, VOL I, 2009, : 393 - 395
  • [36] Visual cryptography scheme for secret color images with color QR codes
    Pan, Jeng-Shyang
    Liu, Tao
    Yang, Hong-Mei
    Yan, Bin
    Chu, Shu-Chuan
    Zhu, Tongtong
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 82
  • [37] A cheating prevention scheme for binary visual cryptography with homogeneous secret images
    Tsai, Du-Shiau
    Chen, Tzung-Her
    Horng, Gwoboa
    [J]. PATTERN RECOGNITION, 2007, 40 (08) : 2356 - 2366
  • [38] A hardware-efficient DAC for direct digital synthesis
    Jensen, HT
    Galton, I
    [J]. ISCAS 96: 1996 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS - CIRCUITS AND SYSTEMS CONNECTING THE WORLD, VOL 4, 1996, : 97 - 100
  • [39] On Constructing Secure and Hardware-Efficient Invertible Mappings
    Dubrova, Elena
    [J]. 2016 IEEE 46TH INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC (ISMVL 2016), 2016, : 211 - 216
  • [40] Hardware-Efficient Autonomous Quantum Memory Protection
    Leghtas, Zaki
    Kirchmair, Gerhard
    Vlastakis, Brian
    Schoelkopf, Robert J.
    Devoret, Michel H.
    Mirrahimi, Mazyar
    [J]. PHYSICAL REVIEW LETTERS, 2013, 111 (12)