Journal ArticleDOI
Encryption of pictures and shapes by random grids.
Oded Kafri,Eliezer Keren +1 more
TLDR
A low-cost and simple technique for encryption of two-dimensional patterns and shapes based on the superposition of random grids is suggested and demonstrated.Abstract:
A low-cost and simple technique for encryption of two-dimensional patterns and shapes is suggested and demonstrated. The method is based on the superposition of random grids.read more
Citations
More filters
Journal ArticleDOI
Image encryption by random grids
TL;DR: This paper designs algorithms by using random grids to accomplish the encryption of the secret gray-level and color images in such a way that neither of the two encrypted shares alone leaks the information of thesecret image, whereas the secret can be seen when these two shares are superimposed.
Journal ArticleDOI
Threshold visual secret sharing by random grids
Tzung-Her Chen,Kai-Hsiang Tsao +1 more
TL;DR: A threshold RG-based VSS scheme aiming at providing the wide-use version is presented, and the experimental results and theoretically analysis in visual quality and security show that the proposed scheme performs well.
Journal ArticleDOI
Visual secret sharing by random grids revisited
Tzung-Her Chen,Kai-Hsiang Tsao +1 more
TL;DR: This paper is the first attempt in the literature to develop new RG-based VSS schemes by means of extending the basic 2- out-of-2 scheme to the n-out- of-n as well as 2-out -of-n ones.
Journal ArticleDOI
Image encryption by multiple random grids
TL;DR: This paper designs novel VCRG-n encryption schemes for binary, gray-level and color images, validate the correctness by formal proofs and demonstrate the feasibility by computer simulations.
Journal ArticleDOI
Efficient visual secret sharing scheme for color images
TL;DR: A new c-colored k-out-of-n VSSS is proposed by using a pixel expansion of @?log"2c@?xm that is more efficient than ever.
References
More filters
Journal ArticleDOI
Privacy and authentication: An introduction to cryptography
TL;DR: The basic information theoretic and computational properties of classical and modern cryptographic systems are presented, followed by cryptanalytic examination of several important systems and an examination of the application of cryptography to the security of timesharing systems and computer networks.
Journal ArticleDOI
Moiré Effect from Random Dots
TL;DR: The appearance of circular Moiré fringes when a random dot pattern is superimposed on itself provides new evidence that the human visual process may include the computation of local autocorrelations by excitation of line detectors.