메뉴 건너뛰기




Volumn 89, Issue 8, 2009, Pages 1602-1624

MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty

Author keywords

Misalignment tolerance; Secret sharing; Shadow image; Visual cryptography; Visual secret sharing

Indexed keywords

MISALIGNMENT TOLERANCE; SECRET SHARING; SHADOW IMAGE; VISUAL CRYPTOGRAPHY; VISUAL SECRET SHARING;

EID: 64549086284     PISSN: 01651684     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.sigpro.2009.02.014     Document Type: Article
Times cited : (34)

References (47)
  • 2
    • 0037233509 scopus 로고    scopus 로고
    • Visual cryptography for gray-level images by dithering techniques
    • Lin C.C., and Tsai W.H. Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters 24 (2003) 349-358
    • (2003) Pattern Recognition Letters , vol.24 , pp. 349-358
    • Lin, C.C.1    Tsai, W.H.2
  • 3
    • 0037411307 scopus 로고    scopus 로고
    • Visual cryptography for color images
    • Hou J.C. Visual cryptography for color images. Pattern Recognition 36 (2003) 1619-1629
    • (2003) Pattern Recognition , vol.36 , pp. 1619-1629
    • Hou, J.C.1
  • 6
    • 0000049121 scopus 로고    scopus 로고
    • Constructions and properties of k out of n visual secret sharing scheme
    • Verheul E.R., and Van Tilborg H.C.A. Constructions and properties of k out of n visual secret sharing scheme. Designs, Codes and Cryptography 1 (1997) 179-196
    • (1997) Designs, Codes and Cryptography , vol.1 , pp. 179-196
    • Verheul, E.R.1    Van Tilborg, H.C.A.2
  • 10
    • 33244471538 scopus 로고    scopus 로고
    • Efficient visual secret sharing scheme for color images
    • Shyu S.J. Efficient visual secret sharing scheme for color images. Pattern Recognition 39 (2006) 866-880
    • (2006) Pattern Recognition , vol.39 , pp. 866-880
    • Shyu, S.J.1
  • 11
    • 45549107563 scopus 로고    scopus 로고
    • Colored visual cryptography scheme based on additive color mixing
    • Yang C.N., and Chen T.S. Colored visual cryptography scheme based on additive color mixing. Pattern Recognition 41 (2008) 3114-3129
    • (2008) Pattern Recognition , vol.41 , pp. 3114-3129
    • Yang, C.N.1    Chen, T.S.2
  • 14
    • 0442280816 scopus 로고    scopus 로고
    • New visual secret sharing schemes using probabilistic method
    • Yang C.N. New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25 (2004) 481-494
    • (2004) Pattern Recognition Letters , vol.25 , pp. 481-494
    • Yang, C.N.1
  • 18
    • 32844469722 scopus 로고    scopus 로고
    • Secret image sharing with smaller shadows
    • Wang R.Z., and Su C.H. Secret image sharing with smaller shadows. Pattern Recognition Letters 27 (2006) 551-555
    • (2006) Pattern Recognition Letters , vol.27 , pp. 551-555
    • Wang, R.Z.1    Su, C.H.2
  • 20
    • 4944220178 scopus 로고    scopus 로고
    • Enhancing registration tolerance of extended visual cryptography for natural images
    • Nakajima M., and Yamaguchi Y. Enhancing registration tolerance of extended visual cryptography for natural images. Journal of Electronic Imaging 13 (2004) 654-662
    • (2004) Journal of Electronic Imaging , vol.13 , pp. 654-662
    • Nakajima, M.1    Yamaguchi, Y.2
  • 25
    • 34147183148 scopus 로고    scopus 로고
    • A cheating prevention scheme for binary visual cryptography with homogeneous secret images
    • Tsai D.S., Chen T.H., and Horng G. A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognition 40 (2007) 2356-2366
    • (2007) Pattern Recognition , vol.40 , pp. 2356-2366
    • Tsai, D.S.1    Chen, T.H.2    Horng, G.3
  • 27
    • 55449124062 scopus 로고    scopus 로고
    • Visual cryptography schemes with reversing
    • Yang C.N., Wang C.C., and Chen T.S. Visual cryptography schemes with reversing. The Computer Journal 51 (2008) 710-722
    • (2008) The Computer Journal , vol.51 , pp. 710-722
    • Yang, C.N.1    Wang, C.C.2    Chen, T.S.3
  • 28
    • 13644263677 scopus 로고    scopus 로고
    • Bit-level based secret sharing for image encryption
    • Lukac R., and Plataniotis K.N. Bit-level based secret sharing for image encryption. Pattern Recognition 38 (2005) 767-772
    • (2005) Pattern Recognition , vol.38 , pp. 767-772
    • Lukac, R.1    Plataniotis, K.N.2
  • 29
    • 24944521921 scopus 로고    scopus 로고
    • A cost-effective encryption scheme for color images
    • Lukac R., and Plataniotis K.N. A cost-effective encryption scheme for color images. Real-Time Imaging 11 (2005) 454-464
    • (2005) Real-Time Imaging , vol.11 , pp. 454-464
    • Lukac, R.1    Plataniotis, K.N.2
  • 31
    • 34248584507 scopus 로고    scopus 로고
    • Improvements of image sharing with steganography and authentication
    • Yang C.N., Chen T.S., Yu K.H., and Wang C.C. Improvements of image sharing with steganography and authentication. Journal of Systems & Software 80 (2007) 1070-1076
    • (2007) Journal of Systems & Software , vol.80 , pp. 1070-1076
    • Yang, C.N.1    Chen, T.S.2    Yu, K.H.3    Wang, C.C.4
  • 32
    • 45549098627 scopus 로고    scopus 로고
    • Sharing secrets in stego images with authentication
    • Chang C.C., Hsieh Y.P., and Lin C.H. Sharing secrets in stego images with authentication. Pattern Recognition 41 (2008) 3130-3137
    • (2008) Pattern Recognition , vol.41 , pp. 3130-3137
    • Chang, C.C.1    Hsieh, Y.P.2    Lin, C.H.3
  • 33
    • 34547689489 scopus 로고    scopus 로고
    • VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches
    • Lin S.J., and Lin J.C. VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognition 40 (2007) 3652-3666
    • (2007) Pattern Recognition , vol.40 , pp. 3652-3666
    • Lin, S.J.1    Lin, J.C.2
  • 34
    • 46449106141 scopus 로고    scopus 로고
    • An image secret sharing scheme with the capability of previewing the secret image
    • Beijing, China
    • C.N. Yang, T.S. Chen, An image secret sharing scheme with the capability of previewing the secret image, in: IEEE ICME International Conference on Multimedia & Expo ICME'07, Beijing, China, 2007, pp. 1535-1538.
    • (2007) IEEE ICME International Conference on Multimedia & Expo ICME'07 , pp. 1535-1538
    • Yang, C.N.1    Chen, T.S.2
  • 35
    • 27144456761 scopus 로고    scopus 로고
    • Digital image indexing using secret sharing schemes: a unified framework for single-sensor consumer electronics
    • Lukac R., and Platanniotis K. Digital image indexing using secret sharing schemes: a unified framework for single-sensor consumer electronics. IEEE Transactions on Consumer Electronics 51 (2005) 908-916
    • (2005) IEEE Transactions on Consumer Electronics , vol.51 , pp. 908-916
    • Lukac, R.1    Platanniotis, K.2
  • 37
    • 0036605019 scopus 로고    scopus 로고
    • An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
    • Chang C.C., and Chuang J.C. An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recognition Letters 23 (2002) 931-941
    • (2002) Pattern Recognition Letters , vol.23 , pp. 931-941
    • Chang, C.C.1    Chuang, J.C.2
  • 38
    • 35048851010 scopus 로고    scopus 로고
    • Visual cryptography for digital watermarking in still images
    • Proceedings of the Advances in Multimedia Information Processing
    • G.C. Tsai, L.W. Chang, G.C. Tai, L.W. Chang, Visual cryptography for digital watermarking in still images, in: Proceedings of the Advances in Multimedia Information Processing, Lecture Notes in Computer Science, vol. 3332, 2004, pp. 50-57.
    • (2004) Lecture Notes in Computer Science , vol.3332 , pp. 50-57
    • Tsai, G.C.1    Chang, L.W.2    Tai, G.C.3    Chang, L.W.4
  • 39
    • 10444226634 scopus 로고    scopus 로고
    • A new repeating color watermarking scheme based on human visual model
    • Tai S.C., and Chang C.C. A new repeating color watermarking scheme based on human visual model. Eurasip Journal of Applied Signal Processing (2004) 1965-1972
    • (2004) Eurasip Journal of Applied Signal Processing , pp. 1965-1972
    • Tai, S.C.1    Chang, C.C.2
  • 40
    • 0042286862 scopus 로고    scopus 로고
    • Securing information display by use of visual cryptography
    • Yamamoto H., Hayasaki Y., and Nishida N. Securing information display by use of visual cryptography. Optics Letters 28 (2003) 1564-1566
    • (2003) Optics Letters , vol.28 , pp. 1564-1566
    • Yamamoto, H.1    Hayasaki, Y.2    Nishida, N.3
  • 41
    • 35048826285 scopus 로고    scopus 로고
    • Visual crypto displays enabling secure communications
    • Proceedings of the First International Conference on Security in Pervasive Computing
    • P. Tuyls, T. Kevenaar, G. J. Schrije, A.A.M. Staring, M. van Dijk, Visual crypto displays enabling secure communications, in: Proceedings of the First International Conference on Security in Pervasive Computing, Lecture Notes in Computer Science, vol. 2802, 2003, pp. 271-284.
    • (2003) Lecture Notes in Computer Science , vol.2802 , pp. 271-284
    • Tuyls, P.1    Kevenaar, T.2    Schrije, G.J.3    Staring, A.A.M.4    van Dijk, M.5
  • 42
    • 32344448158 scopus 로고    scopus 로고
    • Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme
    • Yang C.N., Chen T.S., and Ching M.H. Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme. Integrated Computer-Aided Engineering 13 (2006) 189-199
    • (2006) Integrated Computer-Aided Engineering , vol.13 , pp. 189-199
    • Yang, C.N.1    Chen, T.S.2    Ching, M.H.3
  • 43
    • 64549121614 scopus 로고    scopus 로고
    • G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, Visual cryptography for general access structures, in: Proceedings of the Electronic Colloquium on Computational Complexity, TR96-012, 1996.
    • G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, Visual cryptography for general access structures, in: Proceedings of the Electronic Colloquium on Computational Complexity, TR96-012, 1996.
  • 44
    • 84955558118 scopus 로고    scopus 로고
    • Limiting the visible space visual secret sharing schemes and their application to human identification
    • Asiacrypt'96
    • K. Kobara, H. Imai, Limiting the visible space visual secret sharing schemes and their application to human identification, in: Asiacrypt'96, Lecture Notes in Computer Science, vol. 1163, 1996, pp. 185-195.
    • (1996) Lecture Notes in Computer Science , vol.1163 , pp. 185-195
    • Kobara, K.1    Imai, H.2
  • 45
  • 47
    • 46049088141 scopus 로고    scopus 로고
    • Security analysis on authentication of images using recursive visual cryptography
    • Yang C.N., and Chen T.S. Security analysis on authentication of images using recursive visual cryptography. Cryptologia 32 (2008) 131-136
    • (2008) Cryptologia , vol.32 , pp. 131-136
    • Yang, C.N.1    Chen, T.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.