Halftone visual cryptography

被引:0
|
作者
Zhou, Z [1 ]
Arce, GR [1 ]
Di Crescenzo, G [1 ]
机构
[1] Univ Delaware, Dept Elect & Comp Engn, Newark, DE 19716 USA
关键词
D O I
暂无
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
Visual cryptography encodes a secret image SI into n shares of random patterns. If the shares are xeroxed onto transparencies, we can visually decode the secret image by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. Such a scheme is mathematically secure, however, it produces random patterns which have no visual meaning, raising the suspicion of data encryption. In this paper, to achieve a higher level of security, we propose halftone visual cryptography, where all shares are halftones of grey level images carrying significant visual information. The proposed methods utilize blue-noise dithering principles to construct halftone shares having visually pleasing attributes.
引用
收藏
页码:521 / 524
页数:4
相关论文
共 50 条
  • [1] Halftone visual cryptography
    Zhou, Zhi
    Arce, Gonzalo R.
    Di Crescenzo, Giovanni
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (08) : 2441 - 2453
  • [2] HALFTONE VISUAL CRYPTOGRAPHY WITH COLOR SHARES
    Liu, Yuanfeng
    Wang, Zhongmin
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC 2012), 2012, : 746 - 749
  • [3] HALFTONE VISUAL CRYPTOGRAPHY FOR COLOR IMAGES
    Pahuja, Shivani
    Kasana, Singara Singh
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 281 - 285
  • [4] HALFTONE VISUAL CRYPTOGRAPHY BY ITERATIVE HALFTONING
    Wang, Zhongmin
    Arce, Gonzalo R.
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, : 1822 - 1825
  • [5] Halftone Visual Cryptography with Complementary Cover Images
    Shen, Gang
    Liu, Feng
    Fu, Zhengxin
    Yu, Bin
    Wang, Wen
    [J]. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 10082 : 223 - 237
  • [6] Halftone visual cryptography through error diffusion
    Wang, Zhongmin
    Arce, Gonzalo R.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 109 - +
  • [7] Halftone Visual Cryptography Via Error Diffusion
    Wang, Zhongmin
    Arce, Gonzalo R.
    Di Crescenzo, Giovanni
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (03) : 383 - 396
  • [8] Improved Halftone Visual Cryptography by Random Grids
    Liang, Zhuoqian
    Yang, Meihua
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 163 - 170
  • [9] A Halftone Visual Cryptography Schema Using Ordered Dither
    Feng Liu-Ping
    Cong Dong-Sheng
    Liu Hua-Qun
    Wang Meng-Min
    [J]. 6TH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2014), 2014, 9159
  • [10] An Optimized Halftone Visual Cryptography Scheme Using Error Diffusion
    Mahmoud E. Hodeish
    Vikas T. Humbe
    [J]. Multimedia Tools and Applications, 2018, 77 : 24937 - 24953