139
Views
1
CrossRef citations to date
0
Altmetric
Section B

Coloured visual cryptography using fixed size meaningful share

, , &
Pages 1239-1255 | Received 27 Jan 2009, Accepted 07 Jun 2010, Published online: 06 Feb 2011

References

  • Ateniese , G. , Blundo , C. , De Santis , A. and Stinson , D. R. 1996 . Visual cryptography for general access structures . Inform. Comput. , 129 : 86 – 106 .
  • Ateniese , G. , Blundo , C. , Santis , A. D. and Stinson , D. R. 2001 . Extended capabilities for visual cryptography . Theoret. Comput. Sci. , 250 : 143 – 161 .
  • Chang , C. C. and Yu , T. X. Sharing a secret gray image in multiple images . IEEE Proceedings of First International Symposium on CyberWorlds (CW’02) . November 6–8 , Tokyo, Japan. pp. 230 – 237 .
  • Chang , C. C. , Tsai , C. S. and Chen , T. S. A new scheme for sharing secret color images in computer network . IEEE Proceedings of Seventh International Conference on Parallel and Distributed Systems . July 4–7 , Iwate, Japan. pp. 21 – 27 .
  • Chen , T. S. , Shiesh , J. H. and Chen , H. W. 2002 . Using Circular Shadow Image and Fixed Angle Segmentation for Visual Cryptography System . Pan-Yellow-Sea International Workshop on Information Technologies for the Network Era . March 7–8 2002 , Saga, Japan. pp. 214 – 220 . Washington, DC : IEEE Computer Society .
  • Cirnato , S. , De Prisco , R. and De Santis , A. Contrast Optimal Colored Visual Cryptography Schemes . Proceedings of 2003 IEEE Information Theory Workshop . 31 March–4 April , Paris, France. pp. 139 – 142 . Washington, DC : IEEE Computer Society .
  • Cirnato , S. , De Prisco , R. and De Santis , A. 2007 . Colored visual cryptography without color darkening . Theoret. Comput. Sci. , 374 : 261 – 276 .
  • Feng , J. B. , Wu , H. C. , Tsai , C. S. , Chang , Y. F. and Chu , Y. P. 2008 . Visual secret sharing for multiple secrets . Pattern Recognition , 41 : 3572 – 3581 .
  • Hofmeister , T. , Krause , M. and Simon , H. U. 2000 . Contrast-optimal k out of n secret sharing schemes in visual cryptography . Theoret. Comput. Sci. , 240 : 471 – 485 .
  • Hou , Y. C. 2003 . Visual cryptography for color images . Pattern Recognition , 36 : 1619 – 1629 .
  • Hsu , H. C. , Chen , T. S. and Lin , Y. H. 2004 . The Ring Shadow Image Technology of Visual Cryptography by Applying Diverse Rotating Angles to Hide the Secret Sharing . Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control . March 21–23 2004 , Taipei, Taiwan. pp. 996 – 1001 .
  • Hu , C. M. and Tzeng , W. G. 2007 . Cheating prevention in visual cryptography . IEEE Trans. Image Process. , 16 : 36 – 45 .
  • Hwang , R. J. and Chang , C. C. 2001 . Hiding a picture in two pictures . Opt. Eng. , 40 : 342 – 351 .
  • Ishihara , T. and Koga , H. 2002 . New constructions of the lattice-based visual secret sharing scheme using mixture of colors . IEICE Trans. Fundam. , E85-A : 158 – 166 .
  • Ishihara , T. and Koga , H. 2003 . A visual secret sharing scheme for color images based on mean value-color mixing . IEICE Trans. Fundam. , E86-A : 194 – 197 .
  • Iwamoto , M. and Yamamoto , H. 2003 . A construction method of visual secret sharing schemes for plural secret images . IEICE Trans. Fundam. , E86-A : 2577 – 2588 .
  • Iwamoto , M. and Yamamoto , H. 2003 . The optimal n-out-of-n visual secret sharing scheme for gray-scale images . IEICE Trans. Fundam. , E86-A : 2238 – 2247 .
  • Koga , H. 2001 . An analytic construction of the visual secret sharing scheme for color images . IEICE Trans. Fundam. , E84-A : 262 – 272 .
  • Leung , B. W. , Ng , F. Y. and Wong , D. S. 2009 . On the security of a visual cryptography scheme for color images . Pattern Recognition , 42 : 929 – 940 .
  • Lin , C. C. and Tsai , W. H. 2003 . Visual cryptography for gray-level images by dithering techniques . Pattern Recognition Lett. , 24 : 349 – 358 .
  • Liu , F. , Wu , C. K. and Lin , X. J. 2008 . Colour visual cryptography schemes . IET Inform. Security , 2 : 151 – 165 .
  • Nakajima , M. and Yamaguchi , Y. 2002 . Extended visual cryptography for natural images . J. WSCG , 10 : 303 – 310 .
  • Naor , M. and Shamir , A. 1995 . Visual Cryptography , 1 – 12 . Berlin : Springer . Advances in Cryptography: Eurpocrypt’94, Lecture Notes in Computer Science, Vol. 950
  • Naor , M. and Shamir , A. 1997 . Visual Cryptography, II: Improving the Contrast via the Cover Base 197 – 202 . Lecture Notes in Computer Science, Vol. 1189, Springer, Berlin (also available at Theory of Cryptography Library, Report 96-07)
  • Rijmen , V. and Preneel , B. 1996 . Efficient Colour Visual Encryption for Shared Colors of Benetton , Berlin : Eurocrypto’96, Rump Session .
  • Shyu , S. J. 2006 . Efficient visual secret sharing scheme for color images . Pattern Recognition , 39 : 866 – 880 .
  • Tang , C. H. and Laih , C. S. 2000 . New colored visual secret sharing schemes . Designs, Code Cryptogr. , 20 : 325 – 335 .
  • Tsai , D. S. , Chen , T. H. and Horng , G. 2007 . A cheating prevention scheme for binary visual cryptography with homogeneous secret images . Pattern Recognition , 40 : 2356 – 2366 .
  • Verheul , E. R. and van Tilborg , H. C.A. 1997 . Constructions and properties of k out of n visual secret sharing schemes . Designs Codes Cryptogr. , 11 : 179 – 196 .
  • Wu , H. C. and Chang , C. C. 2005 . Sharing visual multi-secret using circle shares . Comput. Standards Interfaces , 28 : 123 – 135 .
  • Wu , H. C. , Wang , H. C. and Tsai , C. S. 2006 . Multiple image sharing based on colour visual cryptography . Imaging Sci. J. , 54 : 164 – 177 .
  • Yang , C. N. and Chen , T. S. 2005 . Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion . Pattern Recognition Lett. , 26 : 193 – 206 .
  • Yang , C. N. and Chen , T. S. 2006 . Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation . Pattern Recognition , 39 : 1300 – 1314 .
  • Yang , C. N. and Chen , T. S. 2008 . Colored visual cryptography scheme based on additive color mixing . Pattern Recognition , 41 : 3114 – 3129 .
  • Yang , C. N. and Laih , C. S. 2000 . New colored visual secret sharing schemes . Designs Codes Cryptogr. , 20 : 325 – 335 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.