2013
DOI: 10.1016/j.jss.2012.09.040
|View full text |Cite
|
Sign up to set email alerts
|

Image sharing method for gray-level images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(28 citation statements)
references
References 14 publications
0
28
0
Order By: Relevance
“…To demonstrate the comparison of the sharable secret capacity between the related secret-sharing schemes [Lin and Tsai 2004;Yang et al 2007;Chang et al 2008;Ulutas et al 2011;Eslami and Ahmadabadi 2011;Chen 2013;Ulutas et al 2013] with the proposed DVSS, Figure 7 shows the maximum sharable secret payload under a different setting of t. The secret payload of other schemes [Lin and Tsai 2004;Yang et al 2007] is fixed to H × W/4 pixels. The secret payload is H × W/4 × t digits with 251-ary notational system for the schemes of Chang et al [2008] and Ulutas et al [2011].…”
Section: Simulation Results and Analysismentioning
confidence: 99%
“…To demonstrate the comparison of the sharable secret capacity between the related secret-sharing schemes [Lin and Tsai 2004;Yang et al 2007;Chang et al 2008;Ulutas et al 2011;Eslami and Ahmadabadi 2011;Chen 2013;Ulutas et al 2013] with the proposed DVSS, Figure 7 shows the maximum sharable secret payload under a different setting of t. The secret payload of other schemes [Lin and Tsai 2004;Yang et al 2007] is fixed to H × W/4 pixels. The secret payload is H × W/4 × t digits with 251-ary notational system for the schemes of Chang et al [2008] and Ulutas et al [2011].…”
Section: Simulation Results and Analysismentioning
confidence: 99%
“…The scheme is an addition to visual secret sharing scheme for grey scale images introduced in by C h e n [63], includes two steps in encryption: initially, the original image is divided into two equal sized pixel blocks and pixels from each block is encrypted using Hill cipher. Secondly, the sub images obtained from Step 1 are translated into two cipher grids by applying bit wise XOR operation between sub images and a RG.…”
Section: Recently Proposed Random Grid Image Encryption Methodsmentioning
confidence: 99%
“…Chen proposed a lossless image sharing method for gray level images [9]. Hill cipher method has been used to divide the image.…”
Section: Related Workmentioning
confidence: 99%