Embedded Extended Visual Cryptography Schemes
نویسندگان
چکیده
منابع مشابه
Extended visual cryptography schemes
Abstract. Visual cryptography schemes have been introduced in 1994 by Naor and Shamir. Their idea was to encode a secret image into n shadow images and to give exactly one such shadow image to each member of a group P of n persons. Whereas most work in recent years has been done concerning the problem of qualified and forbidden subsets of P or the question of contrast optimizing, in this paper ...
متن کاملExtended Schemes for Visual Cryptography
An extended visual cryptography scheme, (? Qual ; ? Forb ; m)-EVCS for short, with pixel \expansion" m, for an access structure (? Qual ; ? Forb) on a set of n participants, is a technique to encode n innocent looking images in such a way that when we stack together the transparencies associated to participants in any set X 2 ? Qual we get the secret message with no trace of the original images...
متن کاملA Survey on Embedded Halftoned Shares in Extended Visual Cryptography Schemes
With the rapid advancement of network technology, multimedia information is transmitted over the Internet conveniently. Various confidential data such as military maps and commercial identifications are transmitted over the Internet. While using secret images, security issues should be taken into consideration because hackers may utilize weak link over communication network to steal information...
متن کاملOn the Analysis and Generalization of Extended Visual Cryptography Schemes
An Extended Visual Cryptography Scheme (EVCS) was proposed by Ateniese et al. [3] to protect a binary secret image with meaningful (innocent-looking) shares. This is implemented by concatenating an extended matrix to each basis matrix. The minimum size of the extended matrix was obtained from a hypergraph coloring model and the scheme was designed for binary images only [3]. In this paper, we g...
متن کاملA Survey on Embedded Extended Visual Cryptography Scheme
For the safeguard of digital contents from being intercepted by unauthorised parties is a very serious issue in information security.Visual cryptography is the art of securing information by concealing the secret image into number of shares and these shares are distributed to intended recipients. This paper defines how to implement the embedded extended visual cryptography scheme and the experi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2011
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2011.2116782