The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2014
DOI: 10.12785/amis/080528
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Visual Secret Checking of Meaningful Sharing Images

Abstract: Visual secret checking refers to the superimposition of one key image and another public sharing image without auxiliary automated computation, in order to recognize the specified secret via human inspection. This paper achieves the goals of: guaranteeing that the related contents of a secret are not revealed after any public sharing image superimposition, confirming the accuracy of any public sharing image, and providing for the ease of management of various types of sharing images. When a user is outside of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…Generally, the visual cryptographic technique implementation was the chaotic model for generating meaningful shares [3]. The researcher followed either expanding the original pixels (pixel expansion) or pixel non-expansion method to construct meaningful shares.…”
Section: Introductionmentioning
confidence: 99%
“…Generally, the visual cryptographic technique implementation was the chaotic model for generating meaningful shares [3]. The researcher followed either expanding the original pixels (pixel expansion) or pixel non-expansion method to construct meaningful shares.…”
Section: Introductionmentioning
confidence: 99%