Results 1 - 10
of
319
Visual Cryptography Schemes with Optimal Pixel Expansion
, 2006
"... A visual cryptography scheme encodes a black & white secret image into n shadow images called shares which are distributed to the n participants. Such shares are such that only qualified subsets of participants can "visually" recover the secret image. Usually, the reconstructed image w ..."
Abstract
-
Cited by 7 (1 self)
- Add to MetaCart
the background. We prove a lower bound on the pixel expansion of the scheme and, for (2, n)-threshold visual cryptography schemes, we provide schemes achieving the bound. Our schemes improve on the ones proposed by Tzeng and Hu.
On the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes
"... Abstract. In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then dis-tributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of pa ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
of participants have no information about the secret image. Pixel expansion, which represents the number of subpixels in the encoding of the secret image, should be as small as possible. Optimal schemes are those that have the minimum pixel expansion. In this paper we study the pixel expansion of hypergraph
Visual Cryptography Scheme Based On Pixel Expansion for Black & White Image
"... Abstract: This paper explains the 2 out of 2 visual cryptography schemes based on pixel expansion m=2 in detail. Visual cryptography enables the secure transmission of images in open and insecure media. The scheme explained in this paper is based on k out of k visual cryptography scheme. To prevent ..."
Abstract
- Add to MetaCart
Abstract: This paper explains the 2 out of 2 visual cryptography schemes based on pixel expansion m=2 in detail. Visual cryptography enables the secure transmission of images in open and insecure media. The scheme explained in this paper is based on k out of k visual cryptography scheme. To prevent
Threshold visual cryptography scheme for color images with no pixel expansion
- In Proceedings of the Second Symposium International Computer Science and Computation Technology
"... Abstract—Since the introduction of threshold visual cryptography by Naor and Shamir, there have been many other schemes proposed; some of them support color images with a limited number of color levels while a few others achieve the property of no pixel expansion. However, it is unknown if there is ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
Abstract—Since the introduction of threshold visual cryptography by Naor and Shamir, there have been many other schemes proposed; some of them support color images with a limited number of color levels while a few others achieve the property of no pixel expansion. However, it is unknown
Improving Image Quality In Extended Visual Cryptography For Halftone Images With No Pixel Expansion
"... Abstract: Visual cryptography is a secret sharing scheme that divides secret images into shares such that, when the shares are superimposed, a hidden secret image is revealed. In extended visual cryptography, an extra security is provided by giving cover images to the shares. However, in either case ..."
Abstract
- Add to MetaCart
case, loss of resolution, contrast, and image size expansion are challenging problems that the researchers are facing. In this paper, we propose a method for processing halftone images that improves the quality of the recovered images and also avoids pixel expansion. The resulting scheme maintains
AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES
"... Visual cryptography is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed. In extended visual cryptography, the share images are constructed to contain meaningful cover images, thereby providing opportunities ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Visual cryptography is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed. In extended visual cryptography, the share images are constructed to contain meaningful cover images, thereby providing opportunities for integrating visual cryptography and biometric security techniques. In this paper, we propose a method for processing halftone images that improves the quality of the share images and the recovered secret image in an extended visual cryptography scheme for which the size of the share images and the recovered image is the same as for the original halftone secret image. The resulting scheme maintains the perfect security of the original extended visual cryptography approach. Index Terms — cryptography, image processing, visual cryptography, secret sharing Table 1. Illustration of a (2, 2) VC Scheme with 4 Subpixels 1.
Achieving Optimal Contrast in Visual Cryptography Schemes without Pixel Expansion
"... Abstract — In this paper we present visual cryptography scheme to encode a black and white image into the same size shares as the secret image. In addition, an improved method for the generation of shares is proposed using additional matrix. Visual cryptography method for encrypting printed texts, h ..."
Abstract
- Add to MetaCart
scheme achieves better contrast and reduces the noise in the reconstructed secret image without adding any computational complexity. In this technique the number of white pixels in the reconstructed secret image can be
GES: A Group based Encoding of Shares for Visual Cryptography without Pixel Expansion
"... Pixel Expansion has been one of the problems of Visual Cryp-tography that is yet to be properly addressed. Existing meth-ods to deal with this problem either have security vulnerabil-ities and/or produce results of poor quality. In this paper we propose a grouping based approach to encoding shares i ..."
Abstract
- Add to MetaCart
Pixel Expansion has been one of the problems of Visual Cryp-tography that is yet to be properly addressed. Existing meth-ods to deal with this problem either have security vulnerabil-ities and/or produce results of poor quality. In this paper we propose a grouping based approach to encoding shares
Mathematics & Industrial Engineering Special Issue MAXIMAL INDEPENDENT SETS FOR THE PIXEL EXPANSION OF GRAPH ACCESS STRUCTURE
"... Abstract:A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no inform ..."
Abstract
- Add to MetaCart
no information regarding the secret image. In this paper a maximal independent sets of the graph G was applied to propose a lower bound on the pixel expansion of visual cryptography schemes with graph access structure (G). In addition a lower bound on the pixel expansion of basis matrices C5 and Peterson graph
Fast approximate energy minimization via graph cuts
- IEEE Transactions on Pattern Analysis and Machine Intelligence
, 2001
"... In this paper we address the problem of minimizing a large class of energy functions that occur in early vision. The major restriction is that the energy function’s smoothness term must only involve pairs of pixels. We propose two algorithms that use graph cuts to compute a local minimum even when v ..."
Abstract
-
Cited by 2120 (61 self)
- Add to MetaCart
the energy. The second move we consider is an α-expansion: for a label α, this move assigns an arbitrary set of pixels the label α. Our second
Results 1 - 10
of
319