scispace - formally typeset
Journal ArticleDOI

Encryption of pictures and shapes by random grids.

Oded Kafri, +1 more
- 01 Jun 1987 - 
- Vol. 12, Iss: 6, pp 377-379
TLDR
A low-cost and simple technique for encryption of two-dimensional patterns and shapes based on the superposition of random grids is suggested and demonstrated.
Abstract
A low-cost and simple technique for encryption of two-dimensional patterns and shapes is suggested and demonstrated. The method is based on the superposition of random grids.

read more

Citations
More filters
Journal ArticleDOI

Image encryption by random grids

TL;DR: This paper designs algorithms by using random grids to accomplish the encryption of the secret gray-level and color images in such a way that neither of the two encrypted shares alone leaks the information of thesecret image, whereas the secret can be seen when these two shares are superimposed.
Journal ArticleDOI

Threshold visual secret sharing by random grids

TL;DR: A threshold RG-based VSS scheme aiming at providing the wide-use version is presented, and the experimental results and theoretically analysis in visual quality and security show that the proposed scheme performs well.
Journal ArticleDOI

Visual secret sharing by random grids revisited

TL;DR: This paper is the first attempt in the literature to develop new RG-based VSS schemes by means of extending the basic 2- out-of-2 scheme to the n-out- of-n as well as 2-out -of-n ones.
Journal ArticleDOI

Image encryption by multiple random grids

TL;DR: This paper designs novel VCRG-n encryption schemes for binary, gray-level and color images, validate the correctness by formal proofs and demonstrate the feasibility by computer simulations.
Journal ArticleDOI

Efficient visual secret sharing scheme for color images

TL;DR: A new c-colored k-out-of-n VSSS is proposed by using a pixel expansion of @?log"2c@?xm that is more efficient than ever.
References
More filters
Journal ArticleDOI

Privacy and authentication: An introduction to cryptography

TL;DR: The basic information theoretic and computational properties of classical and modern cryptographic systems are presented, followed by cryptanalytic examination of several important systems and an examination of the application of cryptography to the security of timesharing systems and computer networks.
Journal ArticleDOI

Moiré Effect from Random Dots

TL;DR: The appearance of circular Moiré fringes when a random dot pattern is superimposed on itself provides new evidence that the human visual process may include the computation of local autocorrelations by excitation of line detectors.