2018
DOI: 10.1007/s41095-018-0108-x
|View full text |Cite
|
Sign up to set email alerts
|

Magic sheets: Visual cryptography with common shares

Abstract: Visual cryptography (VC) is an encryption technique for hiding a secret image in distributed and shared images (referred to as shares). VC schemes are employed to encrypt multiple images as meaningless, noisy patterns or meaningful images. However, decrypting multiple secret images using a unique share is difficult with traditional VC. We propose an approach to hide multiple images in meaningful shares. We can decrypt multiple images simultaneously using a common share, which we refer to as a magic sheet.The m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 23 publications
(34 reference statements)
0
3
0
Order By: Relevance
“…Therefore, we think this may be a good direction for researchers in the future. Last, although designing decoding-related art is not a difficult task for graphics researchers, only a few works [ 6 , 8 , 22 , 65 ] exist. This may be because those artists rarely create this type of art, and researchers often follow the artists’ designs.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, we think this may be a good direction for researchers in the future. Last, although designing decoding-related art is not a difficult task for graphics researchers, only a few works [ 6 , 8 , 22 , 65 ] exist. This may be because those artists rarely create this type of art, and researchers often follow the artists’ designs.…”
Section: Resultsmentioning
confidence: 99%
“…However, decrypting multiple secret images using a unique general share is difficult with traditional VC. To solve this problem, Kita and Miyata [ 6 ] proposed an approach. They studied how to hide two secret images, and , in three images, , , and .…”
Section: Shadowmentioning
confidence: 99%
“…So decryption is performed by exploiting the human visual system without any complex computations which is an advantage that overcomes the disadvantage of pixel expansion where the size of the revealed secret image is not the same as the size of the original one. Several studies used visual cryptography as a security scheme for encrypting images in a simple way that can be later decrypted using vision [2] - [11]. Some studies concentrate on black and white images and others on color images [12][13][14][15] [16].…”
Section: Introductionmentioning
confidence: 99%