Implementation of TiOISSS with meaningful shadows and with an additional authentication image |
| |
Affiliation: | 1. Dept. of Electronics & Communication, Pondicherry Engineering College, Puducherry, India;2. Dept of Electronics & Communication, Perunthalaivar Kamarajar Institute of Engg. & Tech., Puducherry, India;1. Department of Electrical and Computer Engineering, University of Missouri, Columbia, MO 65211, USA;2. Department of Computer Science, Shenzhen University, Shenzhen, Guangdong Providence 518060, China;1. Universidad Técnica Federico Santa María, Av. España 1680, CP 110-V Valparaíso, Chile;2. Department of Computer Science, TU Dortmund University, Germany;1. School of Information Science and Engineering, Huaqiao University, Xiamen, China;2. School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore;1. Faculty of Arts and Science, Kyushu University, 819-0395, Japan;2. Faculty of Information Science and Electrical Engineering, Kyushu University, Japan;1. State Key Lab of CAD&CG, Zhejiang University, China;2. Software School of Xiamen University, China |
| |
Abstract: | Visual Cryptography Scheme (VCS) is a cryptographic technique for protecting secret images. The advantage of using VCS is that decoding can be done without use of any computations. Nevertheless, the reconstructed image has poor visual quality. Therefore, Two in One Image Secret Sharing Scheme (TiOISSS) was proposed which takes the advantage of VCS and provides good quality decoded images. However, the existing TiOISSS has security limitations as it is implemented only for noisy shadows. Hence, in this paper, modified TiOISSS is proposed and implemented for meaningful shadows. To enhance the security of the shares and prevent fake shares that may be introduced by hackers, an authentication image is shared along with the secret image. The quality of the reconstructed image is improved by using adaptive halftoning technique. Experimental results demonstrate the improved security and quality by the proposed scheme. |
| |
Keywords: | Visual cryptography Extended visual cryptography Halftoning Polynomial image secret sharing |
本文献已被 ScienceDirect 等数据库收录! |
|