An Efficient Halftone Visual Secret Sharing Scheme

被引:0
|
作者
Arya, K. V. [1 ]
Rishiwal, Vinay [2 ]
Yadav, Arun Kumar [1 ]
机构
[1] ABV Indian Inst Informat Technol & Management, Gwalior 474015, India
[2] MJP Rohilkhand Univ, Inst Engn & Tech, Bareilly 243006, Uttar Pradesh, India
关键词
Visual Cryptography; Halftone visual cryptography; Error diffusion technique; Halftoning; CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Halftone Visual Secret Sharing (VSS) scheme, meaningless random shares are encoded into halftone shares taking meaningful visual information which reduces the suspicion of intruders. Most of the halftone visual secret sharing scheme described in literature generate the shares in the form of the halftone image which makes it difficult for intruded to identify the content of the shares, therefore intruder cannot get access to the content of the original secret image transmitted over the transition media. It is observed that share generating scheme using halftone images increases the security of the data but the quality of the reconstructed image from halftone shares is not good. In this paper, an efficient halftone visual secret sharing scheme is developed which will be able to deal with the problem of contrast loss in the reconstructed images. Finally, experimental results demonstrate the quality of reconstructed image by the proposed scheme which is better than that of other halftone visual secret sharing schemes.
引用
收藏
页码:70 / 74
页数:5
相关论文
共 50 条
  • [1] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [2] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    [J]. EURASIP Journal on Advances in Signal Processing, 2010
  • [3] Efficient visual secret sharing scheme for color images
    Shyu, SH
    [J]. PATTERN RECOGNITION, 2006, 39 (05) : 866 - 880
  • [4] An efficient fingerprinting scheme with secret sharing
    Yong, Seunglim
    Lee, Sang-Ho
    [J]. DIGITAL RIGHTS MANAGEMENT: TECHNOLOGIES, ISSUES, CHALLENGES AND SYSTEMS, 2006, 3919 : 192 - 202
  • [5] A Cheat-Prevention Visual Secret Sharing Scheme with Efficient Pixel Expansion
    Liu, Shenchuan
    Fujiyoshi, Masaaki
    Kiya, Hitoshi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (11) : 2134 - 2141
  • [6] Visual secret sharing in halftone images by multi-scale error diffusion
    Po-Chyi Su
    Tzung-Fu Tsai
    Yu-Chien Chien
    [J]. Multimedia Tools and Applications, 2018, 77 : 12111 - 12138
  • [7] Visual secret sharing in halftone images by multi-scale error diffusion
    Su, Po-Chyi
    Tsai, Tzung-Fu
    Chien, Yu-Chien
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (10) : 12111 - 12138
  • [8] (k,n) halftone visual cryptography based on Shamir's secret sharing
    Ding Haiyang
    Li Zichen
    Bi Wei
    [J]. The Journal of China Universities of Posts and Telecommunications, 2018, (02) : 60 - 76
  • [9] Cheater identifiable visual secret sharing scheme
    Gan Zhi & Chen Kefei1. Computer Science Department
    [J]. Journal of Systems Engineering and Electronics, 2005, (01) : 233 - 236
  • [10] A Novel Quantum Visual Secret Sharing Scheme
    Liu, Wenjie
    Xu, Yinsong
    Zhang, Maojun
    Chen, Junxiu
    Yang, Ching-Nung
    [J]. IEEE ACCESS, 2019, 7 : 114374 - 114384