Abstract:Abstract. Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that are able to be stacked together so as to approximately recover the original image. VC is a unique technique in the sense that the encrypted message can be decrypted directly by the Human Visual System (HVS). The distinguishing characteristic of VC is the ability of secret restoration without the us… Show more
“…273 SKLOIS scientist Liu Feng 刘峰 co-authored a paper with Yan Weiqi on encryption of visual information. 274 Liu was a recipient of a 2013 China-New Zealand Scientist Exchange Programme, where he was based at AUT. 275 Liu Feng is a cryptology specialist.…”
Section: Victoria University In Wellingtonmentioning
In 2017, a Chinese military company proudly announced production of an innovative cargo drone, marketed as suitable as an armed one-use military cargo plane which could drop off supplies in difficult mountainous terrain. 1 China's contested mountainous border with India would be one such location. The plane's technology originated from a well-known New Zealand company that had once been owned by New Zealand taxpayers. The technology had been transferred in a deal that was endorsed by the 2008-2017 New Zealand National Party government. Praising the BAIC-Pacific Aerospace partnership in 2014, then Minister of Trade, Tim Groser, remarked-without any trace of irony-"Relationships like this demonstrate that we don't just export dairy and lamb to China, but also our technology. " 2 New Zealand has indeed increasingly been exporting our innovative and sensitive technology to China. As this paper outlines, some of these exchanges appear to breach our domestic laws and international commitments. The People's Republic of China (PRC) is using civilian links with Western countries to access cutting-edge scientific expertise with military-end-use. China's exploitation of civilian channels for military purposes raises national security, as well as reputational, ethical, and intellectual property risks for New Zealand. New Zealand's experience of grappling with China's covert military links may be relevant for other nations as they too re-assess their scientific, commercial, and educational relations with the PRC.
“…273 SKLOIS scientist Liu Feng 刘峰 co-authored a paper with Yan Weiqi on encryption of visual information. 274 Liu was a recipient of a 2013 China-New Zealand Scientist Exchange Programme, where he was based at AUT. 275 Liu Feng is a cryptology specialist.…”
Section: Victoria University In Wellingtonmentioning
In 2017, a Chinese military company proudly announced production of an innovative cargo drone, marketed as suitable as an armed one-use military cargo plane which could drop off supplies in difficult mountainous terrain. 1 China's contested mountainous border with India would be one such location. The plane's technology originated from a well-known New Zealand company that had once been owned by New Zealand taxpayers. The technology had been transferred in a deal that was endorsed by the 2008-2017 New Zealand National Party government. Praising the BAIC-Pacific Aerospace partnership in 2014, then Minister of Trade, Tim Groser, remarked-without any trace of irony-"Relationships like this demonstrate that we don't just export dairy and lamb to China, but also our technology. " 2 New Zealand has indeed increasingly been exporting our innovative and sensitive technology to China. As this paper outlines, some of these exchanges appear to breach our domestic laws and international commitments. The People's Republic of China (PRC) is using civilian links with Western countries to access cutting-edge scientific expertise with military-end-use. China's exploitation of civilian channels for military purposes raises national security, as well as reputational, ethical, and intellectual property risks for New Zealand. New Zealand's experience of grappling with China's covert military links may be relevant for other nations as they too re-assess their scientific, commercial, and educational relations with the PRC.
“…In [14], an Enriched Secret Sharing Visual Cryptography Scheme (ESSVCS) has been developed to improve security which uses VCS, PISS and private key encryption system to share more data. However, this scheme is not able to provide perfect reconstruction of the secret image.…”
“…Sharing secrets with high-quality recovery is interesting, and consequently, many improved VCSs have been proposed. Some schemes present methods where highquality secret recovery is possible [9]. These schemes, however, rely on complicated computation or archive at the expense of expanding pixels.…”
Section: Introductionmentioning
confidence: 99%
“…Extracted watermarks 9. Wireless Communications and Mobile Computing increasing, the performance overhead decreases from 11 : 3x (for one image) to 5 : 1x (for 15 images).…”
Visual cryptography scheme (VCS) is a secret-sharing scheme which encrypts images as shares and can decrypt shares without digital devices. Although a participant can reveal the secret image by merely stacking a sufficient number of shares, the visual quality of recovered images is reduced, and malicious adversaries can cheat participants by giving faked shares. The paper presents a novel VCS called T-VCS (trusted VCS) which consists of two main components: a high-quality VCS and an enhanced verification scheme of shares based on the emerging Intel Software Guard eXtensions (SGX). While providing high-quality recovery, T-VCS keeps the size of the shares the same as the original secret image. We use SGX to act as a trusted third party (TTP) to verify the validity of the shares in an attested enclave without degrading the image quality. The experimental results show that T-VCS can achieve a balance among contrast, share size, and verification efficiency.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.