메뉴 건너뛰기




Volumn 21, Issue 5, 2007, Pages 879-898

Extended visual secret sharing schemes: Improving the shadow image quality

Author keywords

Extended visual secret sharing scheme; Shadow images; Visual secret sharing scheme

Indexed keywords

COMPUTER VISION; IMAGE QUALITY; PIXELS; SPURIOUS SIGNAL NOISE;

EID: 34547776209     PISSN: 02180014     EISSN: None     Source Type: Journal    
DOI: 10.1142/S0218001407005740     Document Type: Article
Times cited : (47)

References (24)
  • 4
    • 84957879665 scopus 로고    scopus 로고
    • Cerebral cryptography
    • Second Int. Workshop on Information Hiding
    • Y. Desmedt, S. Hou and J. Quisquater, Cerebral cryptography, Second Int. Workshop on Information Hiding, Lecture Notes in Computer Science, Vol. 1525 (1998), pp. 62-72.
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 62-72
    • Desmedt, Y.1    Hou, S.2    Quisquater, J.3
  • 6
    • 31244437258 scopus 로고    scopus 로고
    • Threshold visual cryptography schemes with specified levels of reconstructed pixels
    • P. A. Eisen and D. R. Stinson, Threshold visual cryptography schemes with specified levels of reconstructed pixels, Des. Codes Cryptogr. 25 (2002) 15-61.
    • (2002) Des. Codes Cryptogr , vol.25 , pp. 15-61
    • Eisen, P.A.1    Stinson, D.R.2
  • 8
    • 0037411307 scopus 로고    scopus 로고
    • Visual cryptography for color images
    • J. C. Hou, Visual cryptography for color images, Patt. Recogn. 36 (2003) 1619-1629.
    • (2003) Patt. Recogn , vol.36 , pp. 1619-1629
    • Hou, J.C.1
  • 10
    • 0037233509 scopus 로고    scopus 로고
    • Visual cryptography for gray-level images by dithering techniques
    • C. C. Lin and W. H. Tsai, Visual cryptography for gray-level images by dithering techniques, Patt. Recogn. Lett. 24 (2003) 349-358.
    • (2003) Patt. Recogn. Lett , vol.24 , pp. 349-358
    • Lin, C.C.1    Tsai, W.H.2
  • 11
    • 0141741345 scopus 로고    scopus 로고
    • Secret image sharing with capability of share data reduction
    • C. C. Lin and W. H. Tsai, Secret image sharing with capability of share data reduction, Opt. Engin. 42 (2005) 2340-2345.
    • (2005) Opt. Engin , vol.42 , pp. 2340-2345
    • Lin, C.C.1    Tsai, W.H.2
  • 12
    • 34547782101 scopus 로고    scopus 로고
    • Secret multimedia information sharing with data hiding capacity by simple logic operations
    • Orlando, Florida, USA
    • C. C. Lin and W. H. Tsai, Secret multimedia information sharing with data hiding capacity by simple logic operations, 7th Int. Conf. Information Systems, Analysis, and Synthesis, Orlando, Florida, USA 1 (2001) 50-55.
    • (2001) 7th Int. Conf. Information Systems, Analysis, and Synthesis , vol.1 , pp. 50-55
    • Lin, C.C.1    Tsai, W.H.2
  • 13
    • 27144456761 scopus 로고    scopus 로고
    • Digital image indexing using secret sharing schemes: A unified framework for single-sensor consumer electronics
    • R. Lukac and K. Platanniotis, Digital image indexing using secret sharing schemes: a unified framework for single-sensor consumer electronics, IEEE Trans. Consum. Electron. 51 (2005) 908-916.
    • (2005) IEEE Trans. Consum. Electron , vol.51 , pp. 908-916
    • Lukac, R.1    Platanniotis, K.2
  • 14
    • 13644263677 scopus 로고    scopus 로고
    • Bit-level based secret sharing for image encryption
    • R. Lukac and K. N. Plataniotis, Bit-level based secret sharing for image encryption, Patt. Recogn. 38 (2005) 767-772.
    • (2005) Patt. Recogn , vol.38 , pp. 767-772
    • Lukac, R.1    Plataniotis, K.N.2
  • 15
    • 24944521921 scopus 로고    scopus 로고
    • A cost-effective encryption scheme for color images
    • R. Lukac and K. N. Plataniotis, A cost-effective encryption scheme for color images, Real-Time Imag. 11 (2005) 454-464.
    • (2005) Real-Time Imag , vol.11 , pp. 454-464
    • Lukac, R.1    Plataniotis, K.N.2
  • 16
    • 24944453002 scopus 로고    scopus 로고
    • Image representation based secret sharing
    • R. Lukac and K. N. Plataniotis, Image representation based secret sharing, Commun. CCISA 11 (2005) 103-114.
    • (2005) Commun. CCISA , vol.11 , pp. 103-114
    • Lukac, R.1    Plataniotis, K.N.2
  • 17
    • 4944220178 scopus 로고    scopus 로고
    • Enhancing registration tolerance of extended visual cryptography for natural images
    • M. Nakajima and Y. Yamaguchi, Enhancing registration tolerance of extended visual cryptography for natural images, J. Electron. Imag.13 (2004) 654-662.
    • (2004) J. Electron. Imag , vol.13 , pp. 654-662
    • Nakajima, M.1    Yamaguchi, Y.2
  • 18
    • 84926193517 scopus 로고
    • Visual cryptography, Advances in Cryptology-EUROCRYPT'94
    • M. Naor and A. Shamir, Visual cryptography, Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Science, Vol. 950 (1995) 1-12.
    • (1995) Lecture Notes in Computer Science , vol.950 , pp. 1-12
    • Naor, M.1    Shamir, A.2
  • 19
    • 0347946754 scopus 로고    scopus 로고
    • An image-sharing method with user-friendly shadow images
    • C. C. Thien and J. C. Lin, An image-sharing method with user-friendly shadow images, IEEE Trans. Circuits Syst. Vid. Technol. 13 (2003) 1161-1169.
    • (2003) IEEE Trans. Circuits Syst. Vid. Technol , vol.13 , pp. 1161-1169
    • Thien, C.C.1    Lin, J.C.2
  • 20
    • 35048826285 scopus 로고    scopus 로고
    • P. Tuyls, T. Kevenaar, G. J. Schrije, A. A. M. Staring and M. van Dijk, Visual crypto displays enabling secure communications, Security in Pervasive Computing, Lecture Notes in Computer Science, 2802 (2003) 271-284.
    • P. Tuyls, T. Kevenaar, G. J. Schrije, A. A. M. Staring and M. van Dijk, Visual crypto displays enabling secure communications, Security in Pervasive Computing, Lecture Notes in Computer Science, Vol. 2802 (2003) 271-284.
  • 21
    • 32844469722 scopus 로고    scopus 로고
    • Secret image sharing with smaller shadow images
    • R. Z. Wang and C. H. Su, Secret image sharing with smaller shadow images, Patt. Recogn. Lett.27 (2006) 551-555.
    • (2006) Patt. Recogn. Lett , vol.27 , pp. 551-555
    • Wang, R.Z.1    Su, C.H.2
  • 22
    • 0034251536 scopus 로고    scopus 로고
    • Repeating image watermarking technique by the visual cryptography
    • C. C. Wang, S. C. Tai and C. S. Yu, Repeating image watermarking technique by the visual cryptography, IEICE Trans. Fund.E83-A (2000) 1589-1598.
    • (2000) IEICE Trans. Fund , vol.E83-A , pp. 1589-1598
    • Wang, C.C.1    Tai, S.C.2    Yu, C.S.3
  • 23
    • 0042286862 scopus 로고    scopus 로고
    • Securing information display by use of visual cryptography
    • H. Yamamoto, Y. Hayasaki and N. Nishida, Securing information display by use of visual cryptography, Opt. Lett. 28 (2003) 1564-1566.
    • (2003) Opt. Lett , vol.28 , pp. 1564-1566
    • Yamamoto, H.1    Hayasaki, Y.2    Nishida, N.3
  • 24
    • 32344448158 scopus 로고    scopus 로고
    • Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme
    • C. N. Yang, T. S. Chen and M. H. Ching, Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme, Integr. Comput.-Aided Engin. 13 (2006) 189-199.
    • (2006) Integr. Comput.-Aided Engin , vol.13 , pp. 189-199
    • Yang, C.N.1    Chen, T.S.2    Ching, M.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.