• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 319
Next 10 →

Visual Cryptography Schemes with Optimal Pixel Expansion

by Carlo Blundo Stelvio, Carlo Blundo, Stelvio Cimato, Alfredo De Santis , 2006
"... A visual cryptography scheme encodes a black & white secret image into n shadow images called shares which are distributed to the n participants. Such shares are such that only qualified subsets of participants can "visually" recover the secret image. Usually, the reconstructed image w ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
the background. We prove a lower bound on the pixel expansion of the scheme and, for (2, n)-threshold visual cryptography schemes, we provide schemes achieving the bound. Our schemes improve on the ones proposed by Tzeng and Hu.

On the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes

by Abbas Cheraghi
"... Abstract. In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then dis-tributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of pa ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
of participants have no information about the secret image. Pixel expansion, which represents the number of subpixels in the encoding of the secret image, should be as small as possible. Optimal schemes are those that have the minimum pixel expansion. In this paper we study the pixel expansion of hypergraph

Visual Cryptography Scheme Based On Pixel Expansion for Black & White Image

by Lekhika Chettri
"... Abstract: This paper explains the 2 out of 2 visual cryptography schemes based on pixel expansion m=2 in detail. Visual cryptography enables the secure transmission of images in open and insecure media. The scheme explained in this paper is based on k out of k visual cryptography scheme. To prevent ..."
Abstract - Add to MetaCart
Abstract: This paper explains the 2 out of 2 visual cryptography schemes based on pixel expansion m=2 in detail. Visual cryptography enables the secure transmission of images in open and insecure media. The scheme explained in this paper is based on k out of k visual cryptography scheme. To prevent

Threshold visual cryptography scheme for color images with no pixel expansion

by Xiaoyu Wu, Duncan S. Wong, Qing Li - In Proceedings of the Second Symposium International Computer Science and Computation Technology
"... Abstract—Since the introduction of threshold visual cryptography by Naor and Shamir, there have been many other schemes proposed; some of them support color images with a limited number of color levels while a few others achieve the property of no pixel expansion. However, it is unknown if there is ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
Abstract—Since the introduction of threshold visual cryptography by Naor and Shamir, there have been many other schemes proposed; some of them support color images with a limited number of color levels while a few others achieve the property of no pixel expansion. However, it is unknown

Improving Image Quality In Extended Visual Cryptography For Halftone Images With No Pixel Expansion

by J. Tamilarasi, V. Vanitha, T. Renuka
"... Abstract: Visual cryptography is a secret sharing scheme that divides secret images into shares such that, when the shares are superimposed, a hidden secret image is revealed. In extended visual cryptography, an extra security is provided by giving cover images to the shares. However, in either case ..."
Abstract - Add to MetaCart
case, loss of resolution, contrast, and image size expansion are challenging problems that the researchers are facing. In this paper, we propose a method for processing halftone images that improves the quality of the recovered images and also avoids pixel expansion. The resulting scheme maintains

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES

by N. Askari, H. M. Heys, C. R. Moloney
"... Visual cryptography is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed. In extended visual cryptography, the share images are constructed to contain meaningful cover images, thereby providing opportunities ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Visual cryptography is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed. In extended visual cryptography, the share images are constructed to contain meaningful cover images, thereby providing opportunities for integrating visual cryptography and biometric security techniques. In this paper, we propose a method for processing halftone images that improves the quality of the share images and the recovered secret image in an extended visual cryptography scheme for which the size of the share images and the recovered image is the same as for the original halftone secret image. The resulting scheme maintains the perfect security of the original extended visual cryptography approach. Index Terms — cryptography, image processing, visual cryptography, secret sharing Table 1. Illustration of a (2, 2) VC Scheme with 4 Subpixels 1.

Achieving Optimal Contrast in Visual Cryptography Schemes without Pixel Expansion

by Thomas Monoth, Babu Anto P
"... Abstract — In this paper we present visual cryptography scheme to encode a black and white image into the same size shares as the secret image. In addition, an improved method for the generation of shares is proposed using additional matrix. Visual cryptography method for encrypting printed texts, h ..."
Abstract - Add to MetaCart
scheme achieves better contrast and reduces the noise in the reconstructed secret image without adding any computational complexity. In this technique the number of white pixels in the reconstructed secret image can be

GES: A Group based Encoding of Shares for Visual Cryptography without Pixel Expansion

by Mradula Sharma, Kunal Sain, Mnnit Allahabad, Suneeta Agarwal
"... Pixel Expansion has been one of the problems of Visual Cryp-tography that is yet to be properly addressed. Existing meth-ods to deal with this problem either have security vulnerabil-ities and/or produce results of poor quality. In this paper we propose a grouping based approach to encoding shares i ..."
Abstract - Add to MetaCart
Pixel Expansion has been one of the problems of Visual Cryp-tography that is yet to be properly addressed. Existing meth-ods to deal with this problem either have security vulnerabil-ities and/or produce results of poor quality. In this paper we propose a grouping based approach to encoding shares

Mathematics & Industrial Engineering Special Issue MAXIMAL INDEPENDENT SETS FOR THE PIXEL EXPANSION OF GRAPH ACCESS STRUCTURE

by Massoud Hadian Dehkordi, Abbas Cheraghi
"... Abstract:A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no inform ..."
Abstract - Add to MetaCart
no information regarding the secret image. In this paper a maximal independent sets of the graph G was applied to propose a lower bound on the pixel expansion of visual cryptography schemes with graph access structure (G). In addition a lower bound on the pixel expansion of basis matrices C5 and Peterson graph

Fast approximate energy minimization via graph cuts

by Yuri Boykov, Olga Veksler, Ramin Zabih - IEEE Transactions on Pattern Analysis and Machine Intelligence , 2001
"... In this paper we address the problem of minimizing a large class of energy functions that occur in early vision. The major restriction is that the energy function’s smoothness term must only involve pairs of pixels. We propose two algorithms that use graph cuts to compute a local minimum even when v ..."
Abstract - Cited by 2120 (61 self) - Add to MetaCart
the energy. The second move we consider is an α-expansion: for a label α, this move assigns an arbitrary set of pixels the label α. Our second
Next 10 →
Results 1 - 10 of 319
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University