59
Views
0
CrossRef citations to date
0
Altmetric
Articles

Modified Deterministic Approach for Size Invariant Visual Secret Sharing with Improved Quality of Recovered Secret

, ORCID Icon &

References

  • Chaturvedi, R. N., Sudeep, D. T., & Swati, N. A. (2019). Quality enhancement of visual cryptography for secret sharing of binary, gray and color images [Paper presentation]. Proceedings - 2018 4th International Conference on Computing, Communication Control and Automation, ICCUBEA 2018.
  • Chen, T. H., & Tsao, K. H. (2009). Visual secret sharing by random grids revisited. Pattern Recognition, 42(9), 2203–2217. https://doi.org/10.1016/j.patcog.2008.11.015
  • Chen, T. H., & Tsao, K. H. (2011). Threshold visual secret sharing by random grids. Journal of Systems and Software, 84(7), 1197–1208. https://doi.org/10.1016/j.jss.2011.02.023
  • Cimato, S., De Prisco, R., & De Santis, A. (2017). Probabilistic visual cryptography schemes. In S. Cimato & C.-N Yang (Eds.), Visual cryptography and secret image sharing. CRC Press.
  • Ding, W., Liu, K., Yan, X., & Liu, L. (2018). Polynomial-based secret image sharing scheme with fully lossless recovery. International Journal of Digital Crime and Forensics, 10(2), 120–136. https://doi.org/10.4018/IJDCF.2018040107
  • Douglas, M., Bailey, K., Leeney, M., & Curran, K. (2018). An overview of steganography techniques applied to the protection of biometric data. Multimedia Tools and Applications, 77(13), 17333–17373. https://doi.org/10.1007/s11042-017-5308-3
  • Droste, S. (1996). New Results on visual cryptography. In Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics). Springer.
  • Gonzalez, R. C., Woods, R. E., & Eddins, S. L. (2004). Digital image processing using matlab. Pearson Education.
  • Hu, H., Shen, G., Liu, Y., Fu, Z., & Yu, B. (2019). Improved schemes for visual secret sharing based on random grids. Multimedia Tools and Applications, 78(9), 12055–12082. https://doi.org/10.1007/s11042-018-6738-2
  • Hellman, M. E., & Whitfield, D. (1976). New directions in cryptography. IEEE Transactions of Information Theory, 22, 644–654.
  • Hou, Y. C., Wei, S. C., & Lin, C. Y. (2014). Random-grid-based visual cryptography schemes. IEEE Transactions on Circuits and Systems for Video Technology, 24, 733–744. https://doi.org/10.1109/TCSVT.2013.2280097
  • Ito, R., Kuwakado, H., & Tanaka, H. (1999). Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E82-A, 2172–2177.
  • Kafri, O., & Keren, E. (1987). Encryption of pictures and shapes by random grids. Optics Letters, 12(6), 377–379. https://doi.org/10.1364/OL.12.000377
  • Lehmann, E. L., & Casella, G. (1998). Theory of point estimation (2nd ed.). Springer.
  • Naor, M., & Shamir, A. (1995). Visual cryptography. In Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics). Springer.
  • Shyu, S. J. (2007). Image encryption by random grids. Pattern Recognition, 40(3), 1014–1031. https://doi.org/10.1016/j.patcog.2006.02.025
  • Shyu, S. J. (2009). Image encryption by multiple random grids. Pattern Recognition, 42(7), 1582–1596. https://doi.org/10.1016/j.patcog.2008.08.023
  • Shyu, S. J. (2015). Visual cryptograms of random grids for threshold access structures. Theoretical Computer Science, 565(C), 30–49. https://doi.org/10.1016/j.tcs.2014.10.048
  • Wang, D., Yi, F., & Li, X. (2011). Probabilistic visual secret sharing schemes for grey-scale images and color images. Information Sciences, 181(11), 2189–2208. https://doi.org/10.1016/j.ins.2011.01.019
  • Wang, Z., Simoncelli, E. P., & Bovik, A. C. (2003). Multi-scale structural similarity for image quality assessment [Paper presentation]. Conference Record of the Asilomar Conference on Signals, Systems and Computers.
  • Wu, X., & Sun, W. (2013). Generalized random grid and its applications in visual cryptography. IEEE Transactions on Information Forensics and Security, 8(9), 1541–1553. https://doi.org/10.1109/TIFS.2013.2274955
  • Wu, X., Wong, D. S., & Li, Q. (2010). Extended visual cryptography scheme for color images with no pixel expansion. SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, 7, 423–426.
  • Yan, B., Xiang, Y., & Hua, G. (2019). Improving the visual quality of size-invariant visual cryptography for grayscale images: An analysis-by-synthesis (AbS) approach. IEEE Transactions on Image Processing, 28(2), 896–911. https://doi.org/10.1109/TIP.201874378
  • Yang, C. N. (2004). New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters, 25(4), 481–494. https://doi.org/10.1016/j.patrec.2003.12.011

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.