2019
DOI: 10.31577/cai_2019_6_1272
|View full text |Cite
|
Sign up to set email alerts
|

Cellular Automata Based Image Authentication Scheme Using Extended Visual Cryptography

Abstract: Most of the Visual Cryptography based image authentication schemes hide the share and authentication data into cover images by using an additional data hiding process. This process increases the computational cost of the schemes. Pixel expansion, meaningless shares and use of codebook are other challenges in these schemes. To overcome these issues, an authentication scheme is proposed in which no embedding into the cover images is performed and meaningful authentication shares are created using the watermark a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 41 publications
0
1
0
Order By: Relevance
“…For gray images, it is necessary to apply halftone algorithms so that they can be converted into a binary image and secret sharing can be applied to it. 22,23,25,29 3-Another problem of visual secret sharing is the low contrast of the recovered image. New methods were introduced to increase the quality of recovery images using XOR.…”
mentioning
confidence: 99%
“…For gray images, it is necessary to apply halftone algorithms so that they can be converted into a binary image and secret sharing can be applied to it. 22,23,25,29 3-Another problem of visual secret sharing is the low contrast of the recovered image. New methods were introduced to increase the quality of recovery images using XOR.…”
mentioning
confidence: 99%