Secret Image Transmission Scheme Using Secret Codebook
نویسندگان
چکیده
منابع مشابه
Nonlinear Secret Image Sharing Scheme
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique ...
متن کاملVisual Cryptography Scheme For Secret Image Retrieval
The (t, n) visual cryptography (VC) is a secret stacking of t-1 any out of transparencies reveals the sharing scheme where a secret image is encoded into transparencies, and the secret image. The stacking of or fewer transparencies is unable to extract any information about the secret. We discuss the additions and deletions of users in a dynamic user group. To reduce the overhead of generating ...
متن کاملSecret Image Lossless Transmission Through Mosaic Images
A new secure image transmission technique is proposed, which transforms automatically a given large-volume secret image into mosaic image of the same size. The mosaic image, which looks similar to an arbitrarily selected target image and may be used as a camouflage of the secret image, is yielded by dividing the secret image into blocks and transforming their color characteristics to be those o...
متن کاملMedical Image Dispersal using Enhanced Secret Sharing Threshold Scheme
Security on digital medical image storage system has become a significant concern in today’s healthcare institution. Picture Archiving and Communication (PACS) which is one of current conventional storage systems for digital medical images, faced with several security issues. It fails to guarantee digital medical image survivability, confidentiality and integrity. Based on this issue this study...
متن کاملA Survey on Sharing Secret Image using NVSS Scheme
Secret sharing is of great importance for sharing secret or confidential information. This information can be in the form of documents, images, photographs and many more. Most of the previous visual secret sharing scheme uses shares to conceal secret images. The shares may be printed or in digital form. When the secret image is hidden into the shares, noise-like pixel appears which increase the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2010
ISSN: 0916-8532,1745-1361
DOI: 10.1587/transinf.e93.d.399