Video Encryption by Using Visual Cryptography Based on Wang's Scheme

被引:0
|
作者
Munir, Rinaldi [1 ]
Harlili [1 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat, Bandung, Indonesia
关键词
visual cryptography; video; Wang's scheme;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Visual cryptography could be used to encrypt secret video so that each participant has their own share in encrypted form. The encrypted video could be played. To recover the original video, all participants have to join their shares. In this paper, we developed a method to encrypt video by using Wang's scheme. If the secret video has the audio, then the scheme is applied to each frame. The audio could be combined to each share or not. Experiment results show that the scheme could be applied very well to video. The recovered video is same exactly with the original video.
引用
收藏
页码:17 / 22
页数:6
相关论文
共 50 条
  • [41] Watermarking Scheme Based on Wavelet Transformation and Visual Cryptography
    Young-Chang Hou
    Shih-Chieh Wei
    Hsin-Ju Liu
    A-Yu Tseng
    Journal of Electronic Science and Technology, 2014, (01) : 101 - 106
  • [42] A copyright protection scheme of images based on visual cryptography
    Chang, CC
    Wu, HC
    IMAGING SCIENCE JOURNAL, 2001, 49 (03): : 141 - 150
  • [43] A Novel Visual Cryptography Scheme Based on Substitution Cipher
    Yadav, Gyan Singh
    Ojha, Aparajita
    2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 640 - 643
  • [44] Visual Cryptography based Multiparty Copyright Protect Scheme
    Shen Ying
    Ye Yinlan
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 2, 2010, : 223 - 226
  • [45] A Verifiable Visual Cryptography Scheme Based on XOR Algorithm
    Han, Yanyan
    Dong, Haocong
    He, Wencai
    Liu, Juan
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 673 - 677
  • [46] A secure authenticated image encryption scheme based on elliptic curve cryptography
    Jnana Ramakrishna C.
    Bharath Kalyan Reddy D.
    Amritha P.P.
    Lakshmy K.V.
    Sachnev V.
    International Journal of Computers and Applications, 2024, 46 (03) : 184 - 193
  • [47] A Novel Visual Cryptography Scheme
    Jena, Debasish
    Jena, Sanjay Kumar
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 207 - 211
  • [48] An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography
    Benssalah, Mustapha
    Rhaskali, Yesser
    Drouiche, Karim
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (02) : 2081 - 2107
  • [49] Indirect visual cryptography scheme
    Yang, Xiubo
    Li, Tuo
    Shi, Yishi
    AOPC 2015: IMAGE PROCESSING AND ANALYSIS, 2015, 9675
  • [50] On the randomness of visual cryptography scheme
    Guo, Teng
    Liu, Feng
    Wu, ChuanKun
    Ren, YaWei
    Wang, Wen
    2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 391 - 394