VMVC: Verifiable multi-tone visual cryptography

被引:4
|
作者
Shivani, Shivendra [1 ]
机构
[1] Thapar Univ, Patiala, Punjab, India
关键词
Verifiable visual cryptography; Multi-toned visual cryptography; Secret sharing; Meaningful shares; SECRET IMAGES; LEVEL IMAGES; RANDOM GRIDS; SCHEME;
D O I
10.1007/s11042-017-4422-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional k out of n threshold visual cryptography scheme is proposed to hide a secret image into n shares, where only k or more shares can visually reveal the secret image. Most of the previous state of art approaches on visual cryptography are almost restricted in processing of binary images as secret, which are inadequate for many applications like securely transmission of medical images(Store and Forward Telemedicine), forensic images etc. In this paper, a new Verifiable Multi-toned Visual Cryptography (VMVC) scheme is proposed to securely transmit the confidential images on web. Proposed approach also provides cheating prevention, since each pixel of shares contains a self embedding verifiable bit for integrity test of that pixel. Many existing approaches are suffering from many unnecessary encryption constraints like random shares, codebook requirement, contrast loss etc, which all are successfully addressed in proposed approach. Some comparisons with previously proposed methods are also made. Experimental results and analysis are used to prove the efficiency of proposed approach.
引用
收藏
页码:5169 / 5188
页数:20
相关论文
共 50 条
  • [1] VMVC: Verifiable multi-tone visual cryptography
    Shivendra Shivani
    [J]. Multimedia Tools and Applications, 2018, 77 : 5169 - 5188
  • [2] Verifiable Visual Cryptography
    Hsu, Shuo-Fang
    Chang, Yu-Jie
    Wang, Ran-Zan
    Lee, Yeuan-Kuen
    Huang, Shih-Yu
    [J]. 2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 464 - 467
  • [3] A verifiable visual cryptography scheme
    Han, Yan-Yan
    Wang, Su-Ying
    Hu, Yu-Pu
    He, Wen-Cai
    [J]. Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (01): : 86 - 89
  • [4] A Verifiable Visual Cryptography Scheme
    Yu, Bin
    Fang, Liguo
    Xu, Xiaohui
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 908 - 911
  • [5] VPVC: verifiable progressive visual cryptography
    Shivendra Shivani
    Suneeta Agarwal
    [J]. Pattern Analysis and Applications, 2018, 21 : 139 - 166
  • [6] VPVC: verifiable progressive visual cryptography
    Shivani, Shivendra
    Agarwal, Suneeta
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2018, 21 (01) : 139 - 166
  • [7] Multi-tone FSK with feedback
    Luo, C
    Médard, M
    Zheng, LZ
    Lun, DS
    [J]. 2005 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), VOLS 1 AND 2, 2005, : 112 - 116
  • [8] Multi-tone photonic oscillator
    Sayyah, K
    Yap, D
    [J]. MULTIFREQUENCY ELECTRONIC/PHOTONIC DEVICES AND SYSTEMS FOR DUAL-USE APPLICATIONS, 2001, 4490 : 52 - 62
  • [9] Multi-Tone FSK for Ultrasonic Communication
    Hosman, Thomas
    Yeary, Mark
    Antonio, John K.
    Hobbs, Brent
    [J]. 2010 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE I2MTC 2010, PROCEEDINGS, 2010,
  • [10] Multi-tone Analysis in Nonlinear Systems
    Andrawes, Admoon
    [J]. 2012 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTATIONAL TOOLS FOR ENGINEERING APPLICATIONS (ACTEA), 2012, : 96 - 100