Improving Image Quality In Extended Visual Cryptography For Halftone Images With No Pixel Expansion
نویسندگان
چکیده
Visual cryptography is a secret sharing scheme that divides secret images into shares such that, when the shares are superimposed, a hidden secret image is revealed. In extended visual cryptography, an extra security is provided by giving cover images to the shares. However, in either case, loss of resolution, contrast, and image size expansion are challenging problems that the researchers are facing. In this paper, we propose a method for processing halftone images that improves the quality of the recovered images and also avoids pixel expansion. The resulting scheme maintains the perfect security of the original extended visual cryptography approach and also provides a better result.
منابع مشابه
On the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes
In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...
متن کاملAn Extended Visual Cryptography Algorithm for Quality-Improved Gray Scale Image with Sigmoid Function
Conventional visual secret sharing schemes generate noise-like random pixels on shares to hide secret images. It suffers amanagement problem, because of which dealers cannot visually identify each share. This problem is solved by the extended visual cryptography scheme (EVCS), which adds ameaningful cover image in each share. However, the previous approaches involving the EVCS for general acces...
متن کاملMaximal Independent Sets for the Pixel Expansion of Graph Access Structure
Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...
متن کاملMAXIMAL INDEPENDENT SETS FOR THE PIXEL EXPANSION OF GRAPH ACCESS STRUCTURE
Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...
متن کاملAn Approach for Grey Scale Image in Visual Cryptography Using Error Diffusion Method
Visual cryptography is a special encryption or cryptography technique used for securing the visual information like text, pictures etc to be performed in such a way that their decryption can be performed by human visual system. The basic idea of visual cryptography is based on the process in which the original image is firstly converted into halftone image which is a binary image and then it is...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014