A Fast and Hardware-Efficient Visual Cryptography Scheme for Images

被引:0
|
作者
Vaya, Dipesh [1 ]
Khandelwal, Sarika [1 ]
机构
[1] Geetanjali Inst Tech Studies, Dept Comp Sci & Engn, Udaipur, India
关键词
Secret sharing; Lossless reveal; Shadow images; Shamir's encryption technique;
D O I
10.1007/978-81-322-2517-1_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Shamir's encryption method is to share a secret image by n number of shadow images and then r shadow images can be used to obtain the original secret image. In proposed method, the size of secret image is greater than the size of the shadow image used for the encryption. Such shadow image is beneficial to process in image hiding, transmission, or storage. For this purpose Shamir's encryption technique is used in this proposed work. In Shamir's encryption technique, author used the equation to encrypt the data into multiple parts. In the equation, time required for the multiplication and division of the input components of the data is more than addition and subtraction. Hence, the encryption time is little bit high. To reduce this encryption and decryption time, Shamir's equation is modified by converting all the multiplication part into addition and division parts into subtraction in this proposed work.
引用
收藏
页码:133 / 142
页数:10
相关论文
共 50 条
  • [41] Hardware-Efficient Bilateral Filtering for Stereo Matching
    Yang, Qingxiong
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2014, 36 (05) : 1026 - 1032
  • [42] Construction and Hardware-Efficient Decoding of Raptor Codes
    Zeineddine, Hady
    Mansour, Mohammad M.
    Puri, Ranjit
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (06) : 2943 - 2960
  • [43] A Hardware-Efficient Deblocking Filter Design for HEVC
    Fang, Chih-Chung
    Chen, I-Wen
    Chang, Tian-Sheuan
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 1786 - 1789
  • [44] Computing with Biophysical and Hardware-Efficient Neural Models
    Selyunin, Konstantin
    Hasani, Ramin M.
    Ratasich, Denise
    Bartocci, Ezio
    Grosu, Radu
    [J]. ADVANCES IN COMPUTATIONAL INTELLIGENCE, IWANN 2017, PT I, 2017, 10305 : 535 - 547
  • [45] A Hardware-Efficient Logarithmic Multiplier with Improved Accuracy
    Ansari, Mohammad Saeed
    Cockburn, Bruce F.
    Han, Jie
    [J]. 2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2019, : 928 - 931
  • [46] A Novel Visual Cryptography Scheme
    Jena, Debasish
    Jena, Sanjay Kumar
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 207 - 211
  • [47] On the randomness of visual cryptography scheme
    Guo, Teng
    Liu, Feng
    Wu, ChuanKun
    Ren, YaWei
    Wang, Wen
    [J]. 2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 391 - 394
  • [48] Indirect visual cryptography scheme
    Yang, Xiubo
    Li, Tuo
    Shi, Yishi
    [J]. AOPC 2015: IMAGE PROCESSING AND ANALYSIS, 2015, 9675
  • [49] Nested visual cryptography scheme
    Yuan Zhonglan
    Xia Guangsheng
    Du Ye
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (03) : 459 - 463
  • [50] A Verifiable Visual Cryptography Scheme
    Yu, Bin
    Fang, Liguo
    Xu, Xiaohui
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 908 - 911