2011 Fifth International Conference on Genetic and Evolutionary Computing 2011
DOI: 10.1109/icgec.2011.53
|View full text |Cite
|
Sign up to set email alerts
|

A Verifiable Visual Cryptography Scheme

Abstract: Visual cryptography (VC) is widely used in secret communications without any computations. The past schemes rarely focused on the authentication issue before reconstructing the decrypted image. This paper provided an authentication mechanism for VC and the experiments confirmed its feasibility.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…the advantage of this is that minimal computation requirement to generate the binary secret image without loss of quality of image. yi-hui chen, ci-wei lan and chiaio-chih huang in [6] have proposed the another different approach for visual cryptography is authentication mechanism. in this two procedures are there : a) encryption procedure b) b) decryption procedure…”
Section: A Related Workmentioning
confidence: 99%
“…the advantage of this is that minimal computation requirement to generate the binary secret image without loss of quality of image. yi-hui chen, ci-wei lan and chiaio-chih huang in [6] have proposed the another different approach for visual cryptography is authentication mechanism. in this two procedures are there : a) encryption procedure b) b) decryption procedure…”
Section: A Related Workmentioning
confidence: 99%
“…Task: hiding data [15] in an image through rectangular blocks. Parameters: Curvelet or wavelet sub-band, input image (say X1).…”
Section: B Algorithm For Hiding Datamentioning
confidence: 99%
“…Yi-Hui Chen, Ci-Wei lan and Chiaio-Chih Huang in [11] have proposed the another different approach for visual cryptography is authentication mechanism. In this two procedures are there : a) Encryption procedure b) Decryption procedure…”
Section: C)mentioning
confidence: 99%