Overview of Visual Secret Sharing Schemes for QR Code Message
نویسندگان
چکیده
منابع مشابه
Python Implementation of Visual Secret Sharing Schemes
Visual secret sharing schemes (VSS) represent an important concept of visual cryptography. They permit the sharing of a secret image between multiple participants so that only authorized groups can recover the secret. This paper considers the software implementation of some black-and-white secret images VSS in Python programming language. PIL (Python Imaging Library) provides strong image proce...
متن کاملA Novel Visual Secret Sharing Scheme Based on QR Codes
Inthispaper,anovelvisualsecretsharing(VSS)schemeusingQRcodesisinvestigated.Theproposed visualsecretsharingschemebasedonQRcodes(VSSQR)canvisuallyrevealsecretimagebystacking sufficient(shadowimages)sharesaswellasscantheQRcodebyaQRcodereader.OurVSSQR exploitstheerrorcorrectionmechanismintheQRcodestructure,toembedthebitscorresponding ...
متن کاملVisual Cryptography Schemes for Secret Image Sharing using GAS Algorithm
Visual Cryptography Schemes (VCS) is a method of image encryption used to hide the secret information in images. In the traditional VCS, the secret image is encrypted into n number of shares randomly and distributed to the n number of participates. The secret image can be recovered simply by stacking the shares without any complex computation involved. However previous approach suffers a securi...
متن کاملA novel quality assessment for visual secret sharing schemes
To evaluate the visual quality in visual secret sharing schemes, most of the existing metrics fail to generate fair and uniform quality scores for tested reconstructed images. We propose a new approach to measure the visual quality of the reconstructed image for visual secret sharing schemes. We developed an object detection method in the context of secret sharing, detecting outstanding local f...
متن کاملAnonymous Secret Sharing Schemes
In this paper we study anonymous secret sharing schemes. Informally, in an anonymous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold which shares. In such schemes the computation of the secret can be carried out by giving the shares to a black box that does not know the identities of the participants holding those shares. Phillips and Phillips ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Engineering in Research Trends
سال: 2019
ISSN: 2349-7084
DOI: 10.22362/ijcert/2018/v5/i12/v5i1202