2014
DOI: 10.1109/tifs.2014.2346014
|View full text |Cite
|
Sign up to set email alerts
|

Extended Capabilities for XOR-Based Visual Cryptography

Abstract: The XOR-based visual cryptography (VC) is a possible methodology to solve the poor visual quality problem without darkening the background in VC. However, investigations on XOR-based VC are not sufficient. In this paper, we exploit some extended capabilities for XOR-based VC. Actually, two XOR-based VC algorithms are proposed, namely XOR-based VC for general access structure (GAS) and adaptive region incrementing XOR-based VC. The first algorithm aims to implement complicated sharing strategy using GAS, while … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 63 publications
(18 citation statements)
references
References 37 publications
0
18
0
Order By: Relevance
“…When such mobile devices are available, a (k, n)-XVC schemes can be widely adopted to substitute a (k, n)-OVC scheme. Many schemes focused on a (k, n)-XVC scheme to decrease the construction complexity [21,[23][24][25][26]. Let "⊗" denote the Boolean "XOR" operation and ⊗(B i |U) denote the Boolean XOR-ing of the row j, j ∈ U of B i , i = 0, 1.…”
Section: A (K N)-xvc Schemementioning
confidence: 99%
See 1 more Smart Citation
“…When such mobile devices are available, a (k, n)-XVC schemes can be widely adopted to substitute a (k, n)-OVC scheme. Many schemes focused on a (k, n)-XVC scheme to decrease the construction complexity [21,[23][24][25][26]. Let "⊗" denote the Boolean "XOR" operation and ⊗(B i |U) denote the Boolean XOR-ing of the row j, j ∈ U of B i , i = 0, 1.…”
Section: A (K N)-xvc Schemementioning
confidence: 99%
“…A good strategy was proposed to improve the contrast, which introduced the "XOR" operation in recovering the secret [11,19,[22][23][24][25]. It is investigated that the contrast for a (k, n)-XVC scheme is 2 k−1 times the contrast for the (k, n)-OVC scheme if the the basis matrices of the latter scheme are adopted [26].…”
Section: Introductionmentioning
confidence: 99%
“…The paper [34] addresses VC algorithms based on XOR for general access structure and adaptive region incrementing XOR based VC. This paper reviews the visual cryptography schemes and their performance.…”
Section: Xor and Or And Other Vcsmentioning
confidence: 99%
“…The paper [34] analyses the performance of XOR-based cryptography has been exploited and two variants of XOR-based cryptography gets introduced namely XOR-based VC for GAS and adaptive region incrementing XOR based VC. The paper further concludes that complicated sharing strategy by using General Access Structure (GAS) implemented in XOR based VC for GAS.…”
Section: Performance Analysis Of Various Cryptographic Schemesmentioning
confidence: 99%
“…De Santis, and D. R. Stinson [, where an access structure is a specification of all qualified and forbidden subsets of 'n' shares. Any subset of 'k' or more qualified shares can decrypt the secret image but no information can be obtained by stacking lesser number of qualified shares or by stacking disqualified share [1].…”
Section: General Access Structures (Gas)mentioning
confidence: 99%