首页 | 本学科首页   官方微博 | 高级检索  
     


Implementation of TiOISSS with meaningful shadows and with an additional authentication image
Affiliation:1. Dept. of Electronics & Communication, Pondicherry Engineering College, Puducherry, India;2. Dept of Electronics & Communication, Perunthalaivar Kamarajar Institute of Engg. & Tech., Puducherry, India;1. Department of Electrical and Computer Engineering, University of Missouri, Columbia, MO 65211, USA;2. Department of Computer Science, Shenzhen University, Shenzhen, Guangdong Providence 518060, China;1. Universidad Técnica Federico Santa María, Av. España 1680, CP 110-V Valparaíso, Chile;2. Department of Computer Science, TU Dortmund University, Germany;1. School of Information Science and Engineering, Huaqiao University, Xiamen, China;2. School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore;1. Faculty of Arts and Science, Kyushu University, 819-0395, Japan;2. Faculty of Information Science and Electrical Engineering, Kyushu University, Japan;1. State Key Lab of CAD&CG, Zhejiang University, China;2. Software School of Xiamen University, China
Abstract:Visual Cryptography Scheme (VCS) is a cryptographic technique for protecting secret images. The advantage of using VCS is that decoding can be done without use of any computations. Nevertheless, the reconstructed image has poor visual quality. Therefore, Two in One Image Secret Sharing Scheme (TiOISSS) was proposed which takes the advantage of VCS and provides good quality decoded images. However, the existing TiOISSS has security limitations as it is implemented only for noisy shadows. Hence, in this paper, modified TiOISSS is proposed and implemented for meaningful shadows. To enhance the security of the shares and prevent fake shares that may be introduced by hackers, an authentication image is shared along with the secret image. The quality of the reconstructed image is improved by using adaptive halftoning technique. Experimental results demonstrate the improved security and quality by the proposed scheme.
Keywords:Visual cryptography  Extended visual cryptography  Halftoning  Polynomial image secret sharing
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号