Abstract:Abstract. Plane transformation visual cryptography takes a unique approach to some of the current shortcomings of current visual cryptography techniques. Typically, the direction and placement of the encrypted shares is critical when attempting to recover the secret. Many schemes are highly dependant on this stacking order. Within this paper, the scheme presented illustrates a technique whereby this restriction is loosened such that the number of acceptable alignment points is increased by performing a simple … Show more
“…Visual Secret Sharing (VS) provides an excellent, and also efficient method for securely sharing secrets among multiple responsible parties. Establishing trust and confidence is often the most challenging aspect of cryptographic systems [8]. Visual Secret Sharing (VSS) is an extremely secure method of dividing a single secret or information into two or more shares [12].…”
Section: Journal Of University Of Anbar For Pure Science (Juaps)mentioning
confidence: 99%
“…Basic visual secret-sharing techniques eliminate the need for complex decryption calculations through the use of the Human Visual System (HVS), which can perform decryption computations and recreate secret images without the use of computers. However, modern visual secret-sharing methods now employ encryption and decryption algorithms executed by computers with simplified calculations [8].…”
Section: Journal Of University Of Anbar For Pure Science (Juaps)mentioning
confidence: 99%
“…The main target of this method is to guarantee that the original or genuine secret which can be able to only reconstructed once enough shares have been combined. When seen separately, each share, which each holds a distinct portion of the secret, does not reveal the secret, This implies that when shares are divided, they will have no value [8]. To overcome with…”
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used to protect private digital photos from illegal editing and copying. SIS can be classified into two types: single-secret sharing (SSS) and multi-secret sharing (MSS). In SSS, a single secret image is divided into multiple shares, while in MSS, multiple secret images are divided into multiple shares. Both SSS and MSS ensure that the original secret images cannot be reconstructed without the correct combination of shares. Therefore, several secret image-sharing methods have been developed depending on these two methods for example visual cryptography, steganography, discrete wavelet transform, watermarking, and threshold. All of these techniques are capable of randomly dividing the secret image into a large number of shares, each of which cannot provide any information to the intrusion team. This study examined various visual secret-sharing schemes as unique examples of participant secret-sharing methods. Several structures that generalize and enhance VSS were also discussed in this study on covert image-sharing protocols and also this research also gives a comparative analysis of several methods based on various attributes in order to better concentrate on the future directions of the secret image. Generally speaking, the image quality generated employing developed methodologies is preferable to the image quality achieved through using the traditional visual secret-sharing methodology..
“…Visual Secret Sharing (VS) provides an excellent, and also efficient method for securely sharing secrets among multiple responsible parties. Establishing trust and confidence is often the most challenging aspect of cryptographic systems [8]. Visual Secret Sharing (VSS) is an extremely secure method of dividing a single secret or information into two or more shares [12].…”
Section: Journal Of University Of Anbar For Pure Science (Juaps)mentioning
confidence: 99%
“…Basic visual secret-sharing techniques eliminate the need for complex decryption calculations through the use of the Human Visual System (HVS), which can perform decryption computations and recreate secret images without the use of computers. However, modern visual secret-sharing methods now employ encryption and decryption algorithms executed by computers with simplified calculations [8].…”
Section: Journal Of University Of Anbar For Pure Science (Juaps)mentioning
confidence: 99%
“…The main target of this method is to guarantee that the original or genuine secret which can be able to only reconstructed once enough shares have been combined. When seen separately, each share, which each holds a distinct portion of the secret, does not reveal the secret, This implies that when shares are divided, they will have no value [8]. To overcome with…”
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used to protect private digital photos from illegal editing and copying. SIS can be classified into two types: single-secret sharing (SSS) and multi-secret sharing (MSS). In SSS, a single secret image is divided into multiple shares, while in MSS, multiple secret images are divided into multiple shares. Both SSS and MSS ensure that the original secret images cannot be reconstructed without the correct combination of shares. Therefore, several secret image-sharing methods have been developed depending on these two methods for example visual cryptography, steganography, discrete wavelet transform, watermarking, and threshold. All of these techniques are capable of randomly dividing the secret image into a large number of shares, each of which cannot provide any information to the intrusion team. This study examined various visual secret-sharing schemes as unique examples of participant secret-sharing methods. Several structures that generalize and enhance VSS were also discussed in this study on covert image-sharing protocols and also this research also gives a comparative analysis of several methods based on various attributes in order to better concentrate on the future directions of the secret image. Generally speaking, the image quality generated employing developed methodologies is preferable to the image quality achieved through using the traditional visual secret-sharing methodology..
“…Improving the visual quality of recovered secret image was investigated in [11]- [13]. Other applications of VC can be found in [14] and [15]. But pixel expansion and poor image quality problems remain in the above-mentioned VC.…”
The XOR-based visual cryptography (VC) is a possible methodology to solve the poor visual quality problem without darkening the background in VC. However, investigations on XOR-based VC are not sufficient. In this paper, we exploit some extended capabilities for XOR-based VC. Actually, two XOR-based VC algorithms are proposed, namely XOR-based VC for general access structure (GAS) and adaptive region incrementing XOR-based VC. The first algorithm aims to implement complicated sharing strategy using GAS, while maintaining merits such as perfect reconstruction of secret, no pixel expansion, and no code book requirement. In the second algorithm, the concept of adaptive security level is first introduced, where the security levels are recovered in accordance with the qualified sets instead of the quantity of stacked shares. Adaptive region incrementing XOR-based VC further enriches the application scenarios. Theoretical analysis on the proposed algorithms are provided, as well as extensive experimental results and evaluations for demonstrating the effectiveness and advantages of the two methods.Index Terms-Visual cryptography, visual secret sharing, XOR, general access structure, region incrementing, pixel expansion, adaptive security level.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.