A Construction Method of (2, 3) Visual Cryptography Scheme
نویسندگان
چکیده
منابع مشابه
Construction of General (k, n) Probabilistic Visual Cryptography Scheme
⎯Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by subdividing it into shadow images. Due to the nature of encryption VCS is categorized into two types: the deterministic VCS (DVCS) and the probabilistic VCS (PVCS). For the DVCS, we use m (known as the pixel expansion) subpixels to represent a secret pixel. The PVCS uses only one subpixel to represent a secret ...
متن کاملRotation Visual Cryptography Using Basic ( 2 , 2 ) Scheme
Visual cryptography scheme is the concept of encrypting a secret image into n(more than one) shares. Rotation Visual Cryptography scheme (RVCS) allows four secret images to be encrypted into two shares. Using Human Visual System, again the four secret images can be easily recovered by placing the two shares on top of each other with different angles. In this paper proposes a Rotation Visual Cry...
متن کاملA (2, n) and (3, n) Visual Cryptography Scheme for Black and White Images
A visual cryptography scheme (VCS) is a method to encode a secret image into shadow images called shares such that, certain qualified subsets of shares enable the “visual" recovery of the secret image. The “visual" recovery consists of xeroxing the shares onto transparencies, and then stacking them. The shares of a qualified set will reveal the secret image without any cryptographic computation...
متن کاملA Recursive Threshold Visual Cryptography Scheme
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter, thereby increasing the efficiency of secret sharing. We present applications of our proposed protocol to images as well as text.
متن کاملA Novel Weighted Visual Cryptography Scheme with High Visual Quality
Visual Cryptography (VC) has been developed to encode a secret image into n shares for n participants in the past decades, in which each share is treated with the same priority. However, the privilege for participants in a group is not always the same. In this paper, a weighted visual cryptography scheme is proposed such that each participant obtains her/his share with different weight accordin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.2973659