PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Friendly Color Visual Secret Sharing by Random Grids

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The visual secret sharing (VSS) approach by random grids (RG-based VSS) has drawn people's attention "again" recently. Nevertheless, the current RG-based VSS approaches suffer from the problem of meaningless share images (cipher-grids) so that it is not user-friendly to manage noise-like share images. This paper presents a novel color RG-based VSS scheme aiming at providing the friendly color cipher-grids with all the advantages of traditional VSS schemes. To our best knowledge, this paper is the first effort to develop the friendly technique. The experimental results show that the scheme does work.
Wydawca
Rocznik
Strony
61--70
Opis fizyczny
Bibliogr. 15 poz., rys., tab., wykr.
Twórcy
autor
autor
autor
  • Department of Computer Science and Information Engineering, National Chiayi University, 300 University Rd., Chiayi City, Taiwan 60004, R. O. C., thchen@mail.ncyu.edu.tw
Bibliografia
  • [1] Naor M. and Shamir A., "Visual cryptography," Proceedings of Advances in Cryptology-Eurocrypt '94, Lecture Notes in Computer Science, Vol. 950, Springer Berlin, pp. 1-12, 1995.
  • [2] Hou Y. C., "Visual cryptography for color images," Pattern Recognition Vol. 36, pp. 1619-1629, 2003.
  • [3] Thien C. C. and Lin J. C., "An image-sharing scheme with user-friendly shadow images," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 12, pp. 1161-1169, 2003.
  • [4] Zhou Z., Arce G. R., and Crescenzo G. D., "Halftone visual cryptography," IEEE Transactions on Image Processing, Vol. 15, Issue 8, pp. 2441-2453, 2006.
  • [5] Fang W. P., "Friendly progressive visual secret sharing," Pattern Recognition, Vol. 41, pp. 1410-1414, 2008.
  • [6] Kafri O. and Keren E., "Encryption of pictures and shapes by random cipher-grids," Optics Letters, Vol. 12, No. 6, pp. 377-379, 1987.
  • [7] Shyu S. J., "Image encryption by randomcipher-grids", Pattern Recognition, Vol. 40, Issue 3, pp. 1014-1031, 2007.
  • [8] Chen T. H. and Tsao K. H., "Image encryption by (n,n) Random Grids," Proceedings of 18th Information Security Conference, Hualien, May 29-30, 2008.
  • [9] Lukac R. and Plataniotis K. N., "Bit-level based secret sharing for image encryption," Pattern Recognition, Vol. 38, Issue 5, pp. 767-772, 2005.
  • [10] Naor M. and Pinkas B., "Visual authentication and identification," Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, Lecture Notes in Computer Science, Vol. 1294, Santa Barbara, California, USA, pp. 322-336, 1997.
  • [11] Chen T. H., and Tsai D. S., "Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol," Pattern Recognition, Vol. 39, No. 8, pp. 1530-1541, 2006.
  • [12] Chang C. C., Chuang J. C. and Lin P. Y., "Sharing a secret two-tone image in two gray-level images," Proceedings of the 11th International Conference on Parallel and Distributed Systems, Vol. 2, pp. 300-304, 2005.
  • [13] Fang W. P. and Lin J. C., "Visual cryptography with extra ability of hiding confidential data," Journal of Electronic imaging, Vol. 15, No. 2, 023020, 2006.
  • [14] Li Z. N. and Drew M. S., "Fundamentals of multimedia," Pearson Prentice Hall, 2004.
  • [15] Lau D. L. and Arce G. R., "Modern digital halftoning," New York: Marcel-Dekker, pp. 52-89, 2000.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0008-0041
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.