Chen et al., 2011 - Google Patents
Threshold visual secret sharing by random gridsChen et al., 2011
- Document ID
- 9787607361855854802
- Author
- Chen T
- Tsao K
- Publication year
- Publication venue
- Journal of Systems and Software
External Links
Snippet
A new visual secret sharing (VSS) approach by random grids (RG-based VSS), proposed by Kafri and Keren (1987), has drawn close attention recently. With almost all advantages of visual cryptography-based VSS, RG-based VSS benefits more from keeping the same size …
- 230000000007 visual effect 0 title abstract description 31
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chen et al. | Threshold visual secret sharing by random grids | |
Wu et al. | Sharing visual multi-secrets using circle shares | |
Li et al. | Reversible data hiding in encrypted images using cross division and additive homomorphism | |
Baagyere et al. | A multi-layered data encryption and decryption scheme based on genetic algorithm and residual numbers | |
CN104200424B (en) | Difference conversion based (K, N) meaningful image sharing and recovering method | |
Qian et al. | Improved joint reversible data hiding in encrypted images | |
Kandar et al. | Visual cryptography scheme for color image using random number with enveloping by digital watermarking | |
Chen | Image sharing method for gray-level images | |
Wei et al. | A technique for sharing a digital image | |
Islam et al. | A modified LSB image steganography method using filtering algorithm and stream of password | |
Chen et al. | Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map | |
Prasetyo et al. | Improved multiple secret sharing using generalized chaotic image scrambling | |
Yan et al. | Random grid-based visual secret sharing with multiple decryptions | |
Lin et al. | Friendly progressive random-grid-based visual secret sharing with adaptive contrast | |
Wang et al. | Multiuser-based shadow watermark extraction system | |
Li et al. | A novel image-hiding scheme based on block difference | |
Kumar et al. | A novel chaos map based medical image encryption scheme | |
Salehi et al. | Visual multi secret sharing by cylindrical random grid | |
Sridevi et al. | Image steganography combined with cryptography | |
Sharma et al. | Visual cryptographic techniques for secret image sharing: a review | |
Yampolskiy et al. | Password protected visual cryptography via cellular automaton rule 30 | |
Devi et al. | New copyright protection scheme for digital images based on visual cryptography | |
Mandal | Reversible steganography and authentication via transform encoding | |
Chowdhuri et al. | Improved data hiding capacity through repeated embedding using modified weighted matrix for color image | |
Hussein et al. | Protection of images by combination of vernam stream cipher, AES, and LSB steganography in a video clip |