The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2014
DOI: 10.1007/978-3-642-55046-1_1
|View full text |Cite
|
Sign up to set email alerts
|

ESSVCS: An Enriched Secret Sharing Visual Cryptography

Abstract: Abstract. Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that are able to be stacked together so as to approximately recover the original image. VC is a unique technique in the sense that the encrypted message can be decrypted directly by the Human Visual System (HVS). The distinguishing characteristic of VC is the ability of secret restoration without the us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…273 SKLOIS scientist Liu Feng 刘峰 co-authored a paper with Yan Weiqi on encryption of visual information. 274 Liu was a recipient of a 2013 China-New Zealand Scientist Exchange Programme, where he was based at AUT. 275 Liu Feng is a cryptology specialist.…”
Section: Victoria University In Wellingtonmentioning
confidence: 99%
“…273 SKLOIS scientist Liu Feng 刘峰 co-authored a paper with Yan Weiqi on encryption of visual information. 274 Liu was a recipient of a 2013 China-New Zealand Scientist Exchange Programme, where he was based at AUT. 275 Liu Feng is a cryptology specialist.…”
Section: Victoria University In Wellingtonmentioning
confidence: 99%
“…In [14], an Enriched Secret Sharing Visual Cryptography Scheme (ESSVCS) has been developed to improve security which uses VCS, PISS and private key encryption system to share more data. However, this scheme is not able to provide perfect reconstruction of the secret image.…”
Section: Introductionmentioning
confidence: 99%
“…Sharing secrets with high-quality recovery is interesting, and consequently, many improved VCSs have been proposed. Some schemes present methods where highquality secret recovery is possible [9]. These schemes, however, rely on complicated computation or archive at the expense of expanding pixels.…”
Section: Introductionmentioning
confidence: 99%
“…Extracted watermarks 9. Wireless Communications and Mobile Computing increasing, the performance overhead decreases from 11 : 3x (for one image) to 5 : 1x (for 15 images).…”
mentioning
confidence: 99%