(2,3) RIVC Scheme in Visual Cryptography without Pixel Expansion

被引:1
|
作者
Thankappan, Anila [1 ]
Wilscy, M. [1 ]
机构
[1] Univ Kerala, Dept Comp Sci, Thiruvananthapuram 695034, Kerala, India
关键词
visual cryptography; shares; pixel expansion; contrast; color reversal;
D O I
10.1109/ADCONS.2013.47
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Region Incrementing Visual Cryptography (RIVC) was first introduced by R Z Wang in 2009. (2, n) region incrementing visual cryptographic scheme gradually reconstructs the secrets in a single image with multiple security levels. But Wang's scheme suffers from color reversal and pixel expansion. Later, in 2012, k out of n region incrementing scheme and Efficient Construction for Region Incrementing Visual Cryptography using linear programming are also introduced. But all of these have a large pixel expansion problem and some of the methods suffer from colour reversal also. In this paper, efficient construction method of (2,3) RIVCS is introduced without any pixel expansion and increased contrast. The following are the important features of the proposed system. a) It has no pixel expansion b) Increased contrast c) The color reversal problem is completely eliminated.
引用
收藏
页码:259 / 263
页数:5
相关论文
共 50 条
  • [41] A Novel Visual Secret Sharing Scheme without Image Size Expansion
    Askari, Nazanin
    Moloney, Cecilia
    Heys, H. M.
    [J]. 2012 25TH IEEE CANADIAN CONFERENCE ON ELECTRICAL & COMPUTER ENGINEERING (CCECE), 2012,
  • [42] A Digital Watering of 3D Image Scheme Based on Visual Cryptography
    Han, Y. Y.
    Ge, X. N.
    He, W. C.
    Xu, Z. L.
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION TECHNOLOGY (SEIT2015), 2016, : 281 - 285
  • [43] Secret Encryption Using (2,2) Visual Cryptography Scheme with DCT Compression
    Ravella, Yamini
    Chavan, Pallavi
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 344 - 349
  • [44] A Construction of the (4; n)-Threshold Visual Cryptography Scheme Using a 3-Design
    Okada, Koutaro
    Koga, Hiroki
    [J]. PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 223 - 227
  • [45] A Secured One Time Password Authentication Technique using (3,3) Visual Cryptography Scheme
    Christiana, Abikoye Oluwakemi
    Oluwatobi, Akande Noah
    Victory, Garuba Ayomide
    Oluwaseun, Ogundokun Roseline
    [J]. 3RD INTERNATIONAL CONFERENCE ON SCIENCE AND SUSTAINABLE DEVELOPMENT (ICSSD 2019): SCIENCE, TECHNOLOGY AND RESEARCH: KEYS TO SUSTAINABLE DEVELOPMENT, 2019, 1299
  • [46] A Master Share (2, n) XOR based Visual Cryptography Scheme by Random Grids
    Ahammed, Farzin T.
    Sulaiman, M. K.
    [J]. 2015 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION & COMPUTING INDIA (ICCC), 2015, : 528 - 533
  • [47] A multiple-level visual secret-sharing scheme without image size expansion
    Chen, Yung-Fu
    Chan, Yung-Kuan
    Huang, Ching-Chun
    Tsai, Meng-Hsiun
    Chu, Yen-Ping
    [J]. INFORMATION SCIENCES, 2007, 177 (21) : 4696 - 4710
  • [48] On {2,3}-groups without elements of order 6
    Jabara, E.
    [J]. SIBERIAN MATHEMATICAL JOURNAL, 2016, 57 (04) : 744 - 746
  • [49] On {2,3}-groups without elements of order 6
    Lytkina, D. V.
    Mazurov, V. D.
    [J]. SIBERIAN MATHEMATICAL JOURNAL, 2014, 55 (06) : 1098 - 1104
  • [50] RING EXPANSION OF 2-ETHYNYLTHIACYCLOALKANES VIA SULFONIUM YLIDES BY [2,3]-SIGMATROPIC REARRANGEMENT
    SASHIDA, H
    TSUCHIYA, T
    [J]. HETEROCYCLES, 1982, 19 (11) : 2147 - 2150