An Efficient Halftone Visual Secret Sharing Scheme

被引:0
|
作者
Arya, K. V. [1 ]
Rishiwal, Vinay [2 ]
Yadav, Arun Kumar [1 ]
机构
[1] ABV Indian Inst Informat Technol & Management, Gwalior 474015, India
[2] MJP Rohilkhand Univ, Inst Engn & Tech, Bareilly 243006, Uttar Pradesh, India
关键词
Visual Cryptography; Halftone visual cryptography; Error diffusion technique; Halftoning; CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Halftone Visual Secret Sharing (VSS) scheme, meaningless random shares are encoded into halftone shares taking meaningful visual information which reduces the suspicion of intruders. Most of the halftone visual secret sharing scheme described in literature generate the shares in the form of the halftone image which makes it difficult for intruded to identify the content of the shares, therefore intruder cannot get access to the content of the original secret image transmitted over the transition media. It is observed that share generating scheme using halftone images increases the security of the data but the quality of the reconstructed image from halftone shares is not good. In this paper, an efficient halftone visual secret sharing scheme is developed which will be able to deal with the problem of contrast loss in the reconstructed images. Finally, experimental results demonstrate the quality of reconstructed image by the proposed scheme which is better than that of other halftone visual secret sharing schemes.
引用
下载
收藏
页码:70 / 74
页数:5
相关论文
共 50 条
  • [1] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [2] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    EURASIP Journal on Advances in Signal Processing, 2010
  • [3] Efficient visual secret sharing scheme for color images
    Shyu, SH
    PATTERN RECOGNITION, 2006, 39 (05) : 866 - 880
  • [4] Self-verifiable secret sharing scheme with locatability for halftone images
    Dept. of Applied Informatics and Multimedia, Asia University, Taichung
    41354, Taiwan
    不详
    41354, Taiwan
    Int. J. Netw. Secur., 3 (246-250):
  • [5] An efficient fingerprinting scheme with secret sharing
    Yong, Seunglim
    Lee, Sang-Ho
    DIGITAL RIGHTS MANAGEMENT: TECHNOLOGIES, ISSUES, CHALLENGES AND SYSTEMS, 2006, 3919 : 192 - 202
  • [6] A Cheat-Prevention Visual Secret Sharing Scheme with Efficient Pixel Expansion
    Liu, Shenchuan
    Fujiyoshi, Masaaki
    Kiya, Hitoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (11) : 2134 - 2141
  • [7] Visual secret sharing in halftone images by multi-scale error diffusion
    Po-Chyi Su
    Tzung-Fu Tsai
    Yu-Chien Chien
    Multimedia Tools and Applications, 2018, 77 : 12111 - 12138
  • [8] (k,n) halftone visual cryptography based on Shamir's secret sharing
    Ding Haiyang
    Li Zichen
    Bi Wei
    The Journal of China Universities of Posts and Telecommunications, 2018, (02) : 60 - 76
  • [9] Visual secret sharing in halftone images by multi-scale error diffusion
    Su, Po-Chyi
    Tsai, Tzung-Fu
    Chien, Yu-Chien
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (10) : 12111 - 12138
  • [10] Cheater identifiable visual secret sharing scheme
    Gan Zhi & Chen Kefei1. Computer Science Department
    Journal of Systems Engineering and Electronics, 2005, (01) : 233 - 236