Video Encryption by Using Visual Cryptography Based on Wang's Scheme

被引:0
|
作者
Munir, Rinaldi [1 ]
Harlili [1 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat, Bandung, Indonesia
关键词
visual cryptography; video; Wang's scheme;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Visual cryptography could be used to encrypt secret video so that each participant has their own share in encrypted form. The encrypted video could be played. To recover the original video, all participants have to join their shares. In this paper, we developed a method to encrypt video by using Wang's scheme. If the secret video has the audio, then the scheme is applied to each frame. The audio could be combined to each share or not. Experiment results show that the scheme could be applied very well to video. The recovered video is same exactly with the original video.
引用
收藏
页码:17 / 22
页数:6
相关论文
共 50 条
  • [1] Robust Video Watermarking Scheme Based on Visual Cryptography
    Singh, Th. Rupachandra
    Singh, Kh. Manglem
    Roy, Sudipta
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 872 - 877
  • [2] A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme
    Lakshmeeswari, G.
    Lakshmi, D. Rajya
    Srinivas, Y.
    Bindu, G. Hima
    ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 2, 2013, 177 : 511 - 520
  • [3] A Visual Information Encryption Scheme Based on Visual Cryptography and D-H Key Agreement Scheme
    Chan, Chao-Wen
    Wu, Yi-Da
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (04): : 128 - 132
  • [4] An Anti-Cheating Visual Cryptography Scheme Based on Chaotic Encryption System
    Han, Yanyan
    Xu, Zhuolin
    Ge, Xiaonan
    He, Wencai
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED MECHANICS, MECHATRONICS AND INTELLIGENT SYSTEMS (AMMIS2015), 2016, : 581 - 587
  • [5] Video watermarking scheme based on visual cryptography and scene change detection
    Singh, Th. Rupachandra
    Singh, Kh. Manglem
    Roy, Sudipta
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2013, 67 (08) : 645 - 651
  • [6] Encryption Scheme Based on Hyperelliptic Curve Cryptography
    John, Asha Liza
    Thampi, Sabu M.
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 491 - 506
  • [7] Secret Encryption Using (2,2) Visual Cryptography Scheme with DCT Compression
    Ravella, Yamini
    Chavan, Pallavi
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 344 - 349
  • [8] Visual cryptography based on an interferometric encryption technique
    Lee, SS
    Na, JC
    Sohn, SW
    Park, C
    Seo, DH
    Kim, SJ
    ETRI JOURNAL, 2002, 24 (05) : 373 - 380
  • [9] An Image Based Authentication Technique Using Visual Cryptography Scheme
    Dais, Annie, V
    Joe, Vijesh C.
    Sugi, Sidney Swarna S.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 124 - 129
  • [10] Efficient Video Encryption using Lightweight Cryptography Algorithm
    Hussain, Syed Saiq
    Ibrahim, Muhammad Sohail
    Mir, Syed Zain
    Yasin, Sajid
    Majeed, Muhammad Kashif
    Ghani, Azfar
    2018 3RD INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCES AND TECHNOLOGY (ICEEST), 2018,