scispace - formally typeset
Open AccessJournal ArticleDOI

Visual cryptography for gray-level images by dithering techniques

Chang-Chou Lin, +1 more
- 01 Jan 2003 - 
- Vol. 24, Iss: 1, pp 349-358
TLDR
A (k, n)-threshold visual cryptography scheme is proposed to encode a secret image into n shadow images, where any k or more of them can visually recover the secret image, but any k - 1 or fewer of them gain no information about it.
About
This article is published in Pattern Recognition Letters.The article was published on 2003-01-01 and is currently open access. It has received 268 citations till now. The article focuses on the topics: Visual cryptography & Human visual system model.

read more

Citations
More filters
Journal ArticleDOI

Secret image sharing with steganography and authentication

TL;DR: A novel approach to secret image sharing based on a (k, n)-threshold scheme with the additional capabilities of steganography and authentication with the capability of authenticating the fidelity of each processed camouflage image, called a stego-image is proposed.
Journal ArticleDOI

Halftone Visual Cryptography Via Error Diffusion

TL;DR: HVC construction methods based on error diffusion are proposed, where the secret image is concurrently embedded into binary valued shares while these shares are halftoned by error diffusion-the workhorse standard of halftoning algorithms.
Journal ArticleDOI

Two secret sharing schemes based on Boolean operations

TL;DR: A probabilistic (2,n) scheme for binary images and a deterministic (n,n), which provides a better contrast and significantly smaller recognized areas than other methods and gives an exact reconstruction.
Journal ArticleDOI

Sharing multiple secrets in visual cryptography

TL;DR: This paper proposes a visual secret sharing scheme that encodes a set of x≥2 secrets into two circle shares such that none of any single share leaks the secrets and the x secrets can be obtained one by one by stacking the first share and the rotated second shares with x different rotation angles.
Journal ArticleDOI

Rapid and brief communication: Bit-level based secret sharing for image encryption

TL;DR: A new secret sharing scheme capable of protecting image data coded with B bits per pixel is introduced and analyzed in this paper, which allows for cost-effective cryptographic image processing of B-bit images over the Internet.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Book

Digital Watermarking

TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.

Visual Cryptography

Moni Naor, +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Book

Information Hiding Techniques for Steganography and Digital Watermarking

TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Journal ArticleDOI

Visual Cryptography for General Access Structures

TL;DR: This paper examines graph-based access structures, i.e., access structures in which any qualified set of participants contains at least an edge of a given graph whose vertices represent the participants of the scheme, and provides a novel technique for realizing threshold visual cryptography schemes.