2005
DOI: 10.1007/978-3-540-30598-9_17
|View full text |Cite
|
Sign up to set email alerts
|

Colored Visual Cryptography Without Color Darkening

Abstract: In a visual cryptography scheme a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies. Non-qualified subsets of participants have no information about the secret image.In this paper we consider the case when the secret image is a colored image. Most of the previous work on colored visual cryptography allows the superposition of pixels having t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(17 citation statements)
references
References 13 publications
0
17
0
Order By: Relevance
“…In particular, the first method is to directly use the colours appeared in original secret image (Cimato, De Prisco & De Santis, 2007;Rijmen & Preneel, 1996). This CVCS method can also be classified into two approaches of concealing unused colours on VC shares by black colour and increasing or decreasing the colour depth to imitate different colours.…”
Section: Color Visual Cryptographymentioning
confidence: 99%
“…In particular, the first method is to directly use the colours appeared in original secret image (Cimato, De Prisco & De Santis, 2007;Rijmen & Preneel, 1996). This CVCS method can also be classified into two approaches of concealing unused colours on VC shares by black colour and increasing or decreasing the colour depth to imitate different colours.…”
Section: Color Visual Cryptographymentioning
confidence: 99%
“…Since secure erasure of long-term data (which includes challenges but not the user's responses thereto) may be impossible, such acts may compromise all past challenges. 7 In the case of a remote authentication system, the adversary may be able to prompt the challenger to provide a challenge at any time and then abort the protocol. Our system ensures that challenges do not leak data about their interpretation, even in aggregate.…”
Section: Threat Modelmentioning
confidence: 99%
“…The original Naor and Shamir paper [22] discusses k-outof-n threshold schemes more general than the 2-out-of-2 we used here. Visual cryptography has been extended to work with full-color images [14,16,7], with "meaningful" (i.e., non-random) cover images [6,27,28], and general access structures both without [4] and with [5] meaningful cover images. This prior work has tended (the identification schemes of [23] aside) to focus on the act of secret splitting itself, rather than its potential application to authentication.…”
Section: Future Workmentioning
confidence: 99%
“…Many types of visual cryptography have been proposed [8]- [19]. Conventional visual cryptography reduces the contrast of the secret image because its encryption is based on a spatial coding that requires multiple subpixels to modulate light intensity.…”
Section: Introductionmentioning
confidence: 99%