[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Chen et al., 2011 - Google Patents

Threshold visual secret sharing by random grids

Chen et al., 2011

Document ID
9787607361855854802
Author
Chen T
Tsao K
Publication year
Publication venue
Journal of Systems and Software

External Links

Snippet

A new visual secret sharing (VSS) approach by random grids (RG-based VSS), proposed by Kafri and Keren (1987), has drawn close attention recently. With almost all advantages of visual cryptography-based VSS, RG-based VSS benefits more from keeping the same size …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/3232Robust embedding or watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Chen et al. Threshold visual secret sharing by random grids
Wu et al. Sharing visual multi-secrets using circle shares
Li et al. Reversible data hiding in encrypted images using cross division and additive homomorphism
Baagyere et al. A multi-layered data encryption and decryption scheme based on genetic algorithm and residual numbers
CN104200424B (en) Difference conversion based (K, N) meaningful image sharing and recovering method
Qian et al. Improved joint reversible data hiding in encrypted images
Kandar et al. Visual cryptography scheme for color image using random number with enveloping by digital watermarking
Chen Image sharing method for gray-level images
Wei et al. A technique for sharing a digital image
Islam et al. A modified LSB image steganography method using filtering algorithm and stream of password
Chen et al. Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map
Prasetyo et al. Improved multiple secret sharing using generalized chaotic image scrambling
Yan et al. Random grid-based visual secret sharing with multiple decryptions
Lin et al. Friendly progressive random-grid-based visual secret sharing with adaptive contrast
Wang et al. Multiuser-based shadow watermark extraction system
Li et al. A novel image-hiding scheme based on block difference
Kumar et al. A novel chaos map based medical image encryption scheme
Salehi et al. Visual multi secret sharing by cylindrical random grid
Sridevi et al. Image steganography combined with cryptography
Sharma et al. Visual cryptographic techniques for secret image sharing: a review
Yampolskiy et al. Password protected visual cryptography via cellular automaton rule 30
Devi et al. New copyright protection scheme for digital images based on visual cryptography
Mandal Reversible steganography and authentication via transform encoding
Chowdhuri et al. Improved data hiding capacity through repeated embedding using modified weighted matrix for color image
Hussein et al. Protection of images by combination of vernam stream cipher, AES, and LSB steganography in a video clip