73
Views
0
CrossRef citations to date
0
Altmetric
Articles

Sharing two true colour images using (3, 3)-extended visual cryptography technique

&
Pages 1949-1959 | Received 27 Aug 2017, Accepted 13 Apr 2018, Published online: 20 Jun 2018

References

  • Naor, M.; Shamir, A. Visual Cryptography. Advances in Cryptology — EUROCRYPT'94. EUROCRYPT 1994. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg. 1994, 950, 1–12.
  • Verheul, E.R.; Tilborg, H.C.A.V. Constructions and properties of k out of n visual secret sharing schemes. Des. Codes Cryptogr. 1997, 11, 179–196.
  • Koga, H.; Yamamotq, H. Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images. IEICE Trans. Fundam. Electronics Commun. Comput. Sci. 1998, E81-A (6), 1262–1269.
  • Chang C.; Tsai C.; Chen T. A New Scheme for Sharing Secret Color Images in Computer Network, Proceedings of International Conference on Parallel and Distributed Systems, 2000, pp. 21–27.
  • Ateniese, G.; Blundo, C.; De Santis, A.; Stinson, D.R. Extended capabilities for visual cryptography. Theor. Comput. Sci. 2001, 250 (1–2), 143–161.
  • Chang, C.C.; Yu, T.X. Sharing a Secret Gray Image in Multiple Images, Proceedings of International Symposium on Cyber Worlds: Theories and Practice, Tokyo, Japan, 2002, pp. 230–237 2002.
  • Luo, H.; Chen, H.; Shang, Y.; Zhao, Z.; Zhang, Y. Color transfer in visual cryptography. Measurement. 2014, 51, 81–90.
  • Yang, C.N.; Tung, T.C.; Wu, F.H.; Zhou, Z. Color transfer visual cryptography with perfect security. Measurement. 2017, 95, 480–493.
  • De Prisco, R.; De Santis, A. Color visual cryptography schemes for black and white secret images. Theor. Comput. Sci. 2013, 510, 62–86.
  • Chao, K.; Lin, J. (2,3)-Threshold Visual Cryptography for Color Images Cryptography. Proc. 6th WSEAS Int. Conf. Signal Process. 2006, 2006, 89–94.
  • Klein, A.; Wessler, M. Extended visual cryptography schemes. Inform. Comput. 2007, 205 (5), 716–732.
  • Abdulla, S. New Visual Cryptography Algorithm For Colored Image. J. Comput. 2010, 2 (4), 2151–9617.
  • Liu, F.; Wu, C. Embedded Extended Visual Cryptography Schemes. IEEE Trans. Inf. Forensic Secur. 2011, 6 (2), 307–322.
  • Wei, S.C.; Hou, Y.C.; Lu, Y.C. A technique for sharing a digital image. Comput. Stand. Interfaces. 2015, 40, 53–61.
  • Yan X.; Wang S.; Niu X. Signal Process. 2014, 105, 389–398.
  • Yan, X.; Liu, X.; Yang, C.N. An enhanced threshold visual secret sharing based on random grids. J. Real-Time Image Process. 2018, 14 (1), 61–73.
  • Lin F. A New Approach on Color Secret Image Sharing Technique, Department of Information Management, National Central University, 2000.
  • Hofmeister, T.; Krause, M.; Simon, H.U. Contrast-optimal out of secret sharing schemes in visual cryptography. Theor. Comput. Sci. 2000, 240 (2), 471–485.
  • Hou, Y. Visual cryptography for color images. Pattern Recognit. 2003, 36, 1619–1629.
  • Jin, D.; Yan, W.Q.; Kankanhalli, M.S. Progressive color visual cryptography. J. Electron. Imaging. 2005, 14 (3), 033019-1–033019-13.
  • Lou, D.C.; Tso, H.K.; Liu, J.L. A copyright protection scheme for digital images using visual cryptography technique. Comput. Stand. Interfaces. 2007, 29 (1), 125–131.
  • Prakash N.K.; Govindaraju S. Visual Secret Sharing Schemes for Color Images Using Halftoning, International Conference on Computational Intelligence and Multimedia Applications, 2007, pp. 174–178.
  • Kandar, S.; Dhara, B.C. k-n Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence. Int. J. Comput. Appl. 2011, 25 (11), 6–11.
  • Lalitha, Y.S. Non Expanded Visual Cryptography for Color Images using Pseudo Randomized Authentication. Int. J. Eng. Res. Dev. 2014, 10 (6), 1–8.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.