Topic
Visual cryptography
About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.
Papers published on a yearly basis
Papers
More filters
••
01 Nov 2016
TL;DR: The proposed hybrid algorithm provides better imperceptibility in harmony with the human visual system and offers higher robustness against signal processing attacks.
Abstract: In this paper, we propose a new hybrid blind algorithm for the copyright protection of colour images. The novelty in the presented approach consists in designing a hybrid visual cryptography cum discrete wavelet transform based digital colour image watermarking. The distortion caused by new algorithm is assessed by using peak signal to noise ratio (PSNR) and similarity structure index measure (SSIM) and robustness against different types of attacks have been assessed using StirMark. The proposed hybrid algorithm provides better imperceptibility in harmony with the human visual system and offers higher robustness against signal processing attacks.
2 citations
••
01 Jan 2014TL;DR: A robust watermarking worked for multiple images and multiple users, using polynomial-based image secret sharing, DWT transform, and chaos technique to verify copyright easier.
Abstract: In this paper, we proposed a robust watermarking worked for multiple images and multiple users. This scheme adopted polynomial-based image secret sharing, DWT transform, and chaos technique. Secret sharing scheme provides better efficient on protecting copyright with multiple users, specifically in some situation, we are not easy to recover watermark by all participants. In order to verify copyright easier, we use polynomial-based image secret sharing scheme to reach a supervised verification. Any two users whose owns capability can recover the watermark with the trust authority. The experimental result shows that this scheme is efficient and robust.
2 citations
••
06 Dec 2011TL;DR: The experimental results and security analysis state that the proposed visual cryptographic technique leads to active levels of image security and quality without pixel expansion.
Abstract: Visual cryptography is a powerful approach for image sharing security through unsecured network such as Internet. Pixel expansion and bad image quality are the most cons of this approach. Therefore, visual cryptographic technique is proposed for grayscale images to overcome these drawbacks by Fast Fourier Transform (FFT). FFT is used for image sharing where each share is encrypted via Multilayer Security Method (MSM). Image compression is also basically used to eliminate the pixel expansion which is produced before the encryption process. The experimental results and security analysis state that the proposed visual cryptographic technique leads to active levels of image security and quality without pixel expansion.
2 citations
••
27 Aug 2014TL;DR: The two PVSS schemes are equal in terms of their ideas, security and visual quality, and it is shown that the two means are equalIn this paper, the two causes of progressive visual secret sharing are shown.
Abstract: Apart from traditional visual secret sharing (VSS), progressive visual secret sharing (PVSS) can gain clearer recovered secret image with more shares. In the literature, Hou and Quan [Hou, Y. C., Quan, Z. Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. on Circ. and Sys. for Video Tech. 21(11), Pages 1760-1764(2011)], and Chen et al. [Chen, T.-H., et al., Quality-adaptive visual secret sharing by random grids. J. Syst. Software, Volume 86, Issue 5, May 2013, Pages 1267-1274(2013)] proposed two PVSS schemes, respectively, that solved the pixel expansion and poor visual quality problems of previous PVSS. In this paper, we show that the two means are equal in terms of their ideas, security and visual quality.
2 citations