2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2009
DOI: 10.1109/iih-msp.2009.190
|View full text |Cite
|
Sign up to set email alerts
|

Non-expansion Hiding Secret Image in Visual Secret Sharing with Shift Style

Abstract: The paper presents a visual secret sharing scheme, which not only shares an image of moderate confidentiality between two noisy transparencies, but also hides in these two transparencies another secret image. None of the transparencies alone can reveal anything about the image. Later, people can view the image by simply stacking the two transparencies; on the other hand, after change the stack location the other secret image can also be extracted. Different from traditional VC with shift style, the method have… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 8 publications
(15 reference statements)
0
13
0
Order By: Relevance
“…By using the Random Grid Algorithm of Wang et al, [7],the shares are created. For every two images passed as input, three shares would be created.…”
Section: Shares Creation By Random Grid Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…By using the Random Grid Algorithm of Wang et al, [7],the shares are created. For every two images passed as input, three shares would be created.…”
Section: Shares Creation By Random Grid Methodsmentioning
confidence: 99%
“…There is no pixel expansion involved and the size of the shares would be same as that of the input images. The following algorithm By Wang et.al of [7] generates the shares.…”
Section: Shares Creation By Random Grid Methodsmentioning
confidence: 99%
“…These reflections about a line through the origin is obtained with all orthogonal matrices forming an orthogonal group O (2). When the determinant is -1 the operation is a reflection in the x-axis followed by a rotation by an angle of θ, where θ in this case is zero:…”
Section: Fig 1 Traditional Visual Cryptography Decryption Processmentioning
confidence: 99%
“…Therefore, in some situations where a computer is not available to the decipherer, a vision-based secret sharing method provides an apt solution. As regards visual secret sharing research, encryption methods may differ between pixel expansion skill [4,5,6,7,8,9,10,11] and pixel non-expansion skill [12,13,14,15,16]. The majority of the sharing images generated by the above two encryption skills is chaotic, but provides meaningful images [4,9,10].…”
Section: Introductionmentioning
confidence: 99%