期刊文献+

Secret Sharing Using Visual Cryptography

Secret Sharing Using Visual Cryptography
下载PDF
导出
摘要 Compared with the traditional crypto- graphy, visual cryptography (VC) decrypts secret images referring to the characteristics of human vision, rather than the cryptography knowledge or complex computations. Furthermore, seeing to the freeness of the secret key, the whole process of encryption as well as deeryption for the visual cryptography meets a fast dealing course. As to the security concern, it is able to guarantee that no one can have access to any clues about the content of a secret image from individual cover images. Thus, owing to the studies on this area, the target of light-weighted cryptography is reached. Now the visual cryptography has been developed from the meaningless shadows to the meaningful ones. Seeing to the highly developed technique, some advanced VC techniques are introduced in this survey, respectively. Compared with the traditional crypto- graphy, visual cryptography (VC) decrypts secret images referring to the characteristics of human vision, rather than the cryptography knowledge or complex computations. Furthermore, seeing to the freeness of the secret key, the whole process of encryption as well as deeryption for the visual cryptography meets a fast dealing course. As to the security concern, it is able to guarantee that no one can have access to any clues about the content of a secret image from individual cover images. Thus, owing to the studies on this area, the target of light-weighted cryptography is reached. Now the visual cryptography has been developed from the meaningless shadows to the meaningful ones. Seeing to the highly developed technique, some advanced VC techniques are introduced in this survey, respectively.
出处 《Journal of Electronic Science and Technology》 CAS 2010年第4期289-299,共11页 电子科技学刊(英文版)
基金 supported by National Science Council under Grant No. NSC98-2218-E-035-001-MY3
关键词 Light-weighted meaningful shares meaningless shares PROGRESSIVE visual cryptography. Light-weighted, meaningful shares,meaningless shares, progressive, visual cryptography.
  • 相关文献

参考文献10

  • 1W.-P. Fang,J.-C. Lin."Progressive viewing and sharing of sensitive images,"[].Pattern Recognition Image Analysis.2006
  • 2C. C. Thien,J.-C. Lin."An image-sharing method with user-friendly shadow images,"[].IEEE Transactions on Circuits and Systems for Video Technology.2003
  • 3S.-K. Chen,J.-C. Lin."Fault-tolerant and progressive transmission of images,"[].Pattern Recognition.2005
  • 4T. Hofmeister,M. Krause,H. U. Simon."Contrast- optimal k out of n secret sharing schemes in visual cryptography,"[].Theoretical Computer Science.2000
  • 5W.-P. Fang,J.-C. Lin."Visual cryptography with extra ability of hiding confidential data,"[].Journal of Electrocardiology.2006
  • 6Y.-C. Hou,F. Lin,C.-Y. Chang."A new approach on 256 color secret image sharing technique,"[].MIS Reviews.1999
  • 7C.-C. Lin,W.-H. Tsai."Visual cryptography for gray-level images by dithering techniques,"[].Pattern Recognition.2003
  • 8W. Stalling.Cryptography and Network Security: Principles and Practices[]..2010
  • 9R. Lukac,K. N. Plataniotis."Bi-level based secret sharing for image encryption,"[].Pattern Recognition.2005
  • 10R. Lukac,K. N. Plataniotis."Digital image indexing using secret sharing schemes: a unified framework for single-sensor consumer electronics,"[].IEEE Transactions on Consumer Electronics.2005

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部