8,079 Hits in 4.3 sec

On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

Daoshun Wang, Feng Yi
2010 EURASIP Journal on Advances in Signal Processing  
Visual Secret Sharing (VSS) schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced.  ...  Probabilistic visual secret sharing (Prob.VSS) schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in  ...  Acknowledgments The authors would like to thank the anonymous reviewers for their valuable suggestions to improve this paper.  ... 
doi:10.1155/2010/782438 fatcat:o7kzmyqnnnbwxphfqly6bixx2q

Visual Cryptography Scheme with Essential Participants

Peng Li, Liping Yin, Jianfeng Ma
2020 Mathematics  
Visual cryptography scheme (VCS) shares a binary secret image into multiple shadows printed on transparencies. Stacking shadows can visually decode the secret image without computational resources.  ...  Specifically, a (k, n) threshold VCS ((k, n)-VCS) shares a secret image into n shadows, stacking any k shadows can reveal the secret image by human visual system, while any less than k shadows cannot decode  ...  Acknowledgments: The authors would like to thank the editor and the anonymous reviewers for their valuable comments. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/math8050838 fatcat:jszxte6lrrbhpfs7iimd25jkxa

Secret Image Communication Scheme Based on Visual Cryptography and Tetrolet Tiling Patterns

N.RajeshKumar, D.Yuvaraj, G.Manikandan, R.BalaKrishnan, B.Karthikeyan, D.Narasimhanand N.R.Raajan
2020 Computers Materials & Continua  
Visual cryptographic scheme is specially designed for secret image sharing in the form of shadow images.  ...  Finally, the experimental results showcase the proposed scheme is an extraordinary approach to transfer the secret image and reconstruct the secret image with high visual quality in the receiver end.  ...  Funding Statement: The authors received no specific funding for this study. Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/cmc.2020.011226 fatcat:b7y24nvfmneudluk6m4owjdksu

A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction

Cheng Guo, Zhi-hui Wang, Chin-Chen Chang, Chuan Qin
2011 Journal of Multimedia  
The schemes embed the secret image into the cover image to generate shadow images such that enough shadow images can recover the secret image and the cover image.  ...  Experimental results demonstrate that this method obtains better visual quality of shadow images than previous methods.  ...  Since then, many secret image sharing schemes [6] [7] [8] [9] [10] have been proposed to enrich visual cryptology by improving the quality of the reconstructed secret image [6] , overcoming pixel expansion  ... 
doi:10.4304/jmm.6.4.341-348 fatcat:lmrdwfvd5zcnvdmdt35tmz4ofm

Meaningful Secret Image Sharing Scheme with High Visual Quality Based on Natural Steganography

Yuyuan Sun, Yuliang Lu, Jinrui Chen, Weiming Zhang, Xuehu Yan
2020 Mathematics  
In MSISS-NS, the visual quality of shadow images is improved significantly.  ...  The (k,n)-threshold Secret Image Sharing scheme (SISS) is a solution to image protection.  ...  Acknowledgments: The authors would like to thank the editor and the anonymous reviewers for their valuable comments. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/math8091452 fatcat:abv4injum5e6fhznflimoiezpi

A Tabu Search Algorithm for General Threshold Visual Cryptography Schemes

Kanusu Srinivasa Rao, Mandapati Sridhar
2021 Ingénierie des Systèmes d'Information  
An ideally secure technique for a secret image's protection through its partition into shadow images (known as shadows) is the Visual Secret Sharing (VSS) scheme.  ...  In Visual Cryptography Schemes (VCSs), for message n transparencies are generated, such that the original message is visible if any k of them are stacked.  ...  [10] for sharing one or two secret images into three shadows by stacking any two shadows to reveal the secret image. Times the secret image is the shadow size.  ... 
doi:10.18280/isi.260310 fatcat:fpxz6tkadzfqtmas7gaxlj6xfa

A Review on Visual Secret Sharing Schemes for Binary, Gray & Color Image

Vishal V. Panchbhai
2020 Bioscience Biotechnology Research Communications  
Visual Secret Sharing (VSS) schemes capable to handle the problem related with sharing of visual data.  ...  The aim of this paper is to review and examine numerous existing visual secret sharing schemes, which tries to solve above problems.  ...  Various Visual Secret Schemes: Visual secrete sharing scheme is a method of generating two or more shadows with or without making changes and retrieving visual data by combining all or some of them.  ... 
doi:10.21786/bbrc/13.14/63 fatcat:se4sure4bbh3npqcnvwrbi2dca

Robust Secret Image Sharing Scheme against Noise in Shadow Images

Yuyuan Sun, Yuliang Lu, Xuehu Yan, Lintao Liu, Longlong Li
2021 IEEE Access  
ACKNOWLEDGMENT The authors would like to thank the editor and the anonymous reviewers for their valuable comments.  ...  The work is supported by the National Natural Science Foundation of China under Grant No.: 61602491.  ...  The motivation of our paper is to recover the secret image without loss or to improve the visual quality of the recovered image when the shadow images are polluted by noise.  ... 
doi:10.1109/access.2021.3056893 fatcat:yoex7gvsejehnejake5bt62y64

XOR Based Secret Image Sharing Scheme with Security Improvement *

Javvaji V.K. Ratnam
2018 Helix  
A new (k, n) natural secret image sharing scheme based on Boolean XOR operation to improve the secret image security is presented in this research paper.  ...  The secret image is reconstructed at the receiving end by using at least k or more number of share images with little computations of Boolean XOR operations and circular shifting operations.  ...  Hence the visual quality of this recovered secret is improved in the proposed technique.  ... 
doi:10.29042/2018-3588-3592 fatcat:pbdnrwcouncvrgel2yazsilzxe

Weighted Polynomial-Based Secret Image Sharing Scheme with Lossless Recovery

Yongjie Wang, Jia Chen, Qinghong Gong, Xuehu Yan, Yuyuan Sun, Jialiang Peng
2021 Security and Communication Networks  
However, the existing schemes based on visual secret sharing (VSS) and the Chinese remainder theorem (CRT) have some disadvantages.  ...  We use k , k threshold polynomial-based secret image sharing (SIS) to generate k shares and assign them corresponding weights.  ...  reviewers for their valuable comments and suggestions to improve the manuscript.  ... 
doi:10.1155/2021/5597592 fatcat:2p3fd2x6yfcnlisy7z6xtuatai

Significant Secret Image Sharing Scheme Based on Boolean Operation

Monu Verma, Rajneesh Rani
2017 Cybernetics and Information Technologies  
This scheme also conserves the fault tolerance property which plays a vital role in image sharing field.  ...  back the secret image.  ...  In 2002 T h i e n and L i n [3] provide an improved image sharing approach of Shamir's approach, a (k, n) secret image sharing scheme, where k signifies the threshold value (k ≤ n) and n signifies the  ... 
doi:10.1515/cait-2017-0022 fatcat:wyux56tmfra2tcaztx75hdas4i

Visual Cryptography Scheme for Colored Image using XOR with Random Key Generation

T. Ambritha, J. Poorani Sr
2016 International Journal Of Engineering And Computer Science  
Two shares are superimposed to reveal the secret image in the decryption process.  ...  Visual Cryptography Scheme (VCS) eliminates complex computation problem in decryption process, by stacking operation we can restore the secret image.  ...  It can only be recovered when both of the shares are obtained and superimposed. This technique can be extended to n-out-of-n visual cryptography scheme.  ... 
doi:10.18535/ijecs/v5i4.45 fatcat:6gvufudbu5gr5mznzm7viniele

(2,n) secret sharing scheme for gray and color images based on Boolean operation

Lin Dong, DaoShun Wang, ShunDong Li, YiQi Dai
2011 Science China Information Sciences  
Visual secret sharing (VSS) schemes use human visual system to reconstruct the secret without cryptographic computation, but have pixel expansion and loss of contrast.  ...  Traditional secret sharing (SS) schemes can reconstruct the secret precisely, but have high computation complexity.  ...  The contrast of the recovered secret image approximates to the original secret image. Our proposed schemes can be easily extended to share color secret image.  ... 
doi:10.1007/s11432-011-4302-z fatcat:an3zzg4h3vafli4m24k3moxlte

A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix

Kai Gao, Ji-Hwei Horng, Yanjun Liu, Chin-Chen Chang
2020 IEEE Access  
can guarantee optimal visual quality of the generated shadows.  ...  Then, a novel reversible secret image sharing scheme based on the stick insect matrix is presented.  ...  The visual quality of the image shadows produced by our scheme are listed in Table 1 .  ... 
doi:10.1109/access.2020.3009410 fatcat:bggfls6ghvfu3oecduk4ut6cs4

(N, N) Secret Color Image Sharing Scheme with Dynamic Group

Mohamed Fathimal. P, Arockia Jansi Rani .P
2015 International Journal of Computer Network and Information Security  
The key features of this scheme are better visual quality of the recovered image with no pixel expansion, eliminating half toning of color images, eliminating the need for code book to decrypt images since  ...  This paper proposes a new Secret Sharing scheme for secure transmission of color images.  ...  From its inception in 1994, many researchers have extended their ideas for secret color image sharing scheme using visual cryptography.  ... 
doi:10.5815/ijcnis.2015.07.06 fatcat:flc4qurfrbfqfbfpssrdwf5ehy
« Previous Showing results 1 — 15 out of 8,079 results