The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2011
DOI: 10.1007/978-3-642-18405-5_6
|View full text |Cite
|
Sign up to set email alerts
|

Plane Transform Visual Cryptography

Abstract: Abstract. Plane transformation visual cryptography takes a unique approach to some of the current shortcomings of current visual cryptography techniques. Typically, the direction and placement of the encrypted shares is critical when attempting to recover the secret. Many schemes are highly dependant on this stacking order. Within this paper, the scheme presented illustrates a technique whereby this restriction is loosened such that the number of acceptable alignment points is increased by performing a simple … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Visual Secret Sharing (VS) provides an excellent, and also efficient method for securely sharing secrets among multiple responsible parties. Establishing trust and confidence is often the most challenging aspect of cryptographic systems [8]. Visual Secret Sharing (VSS) is an extremely secure method of dividing a single secret or information into two or more shares [12].…”
Section: Journal Of University Of Anbar For Pure Science (Juaps)mentioning
confidence: 99%
See 2 more Smart Citations
“…Visual Secret Sharing (VS) provides an excellent, and also efficient method for securely sharing secrets among multiple responsible parties. Establishing trust and confidence is often the most challenging aspect of cryptographic systems [8]. Visual Secret Sharing (VSS) is an extremely secure method of dividing a single secret or information into two or more shares [12].…”
Section: Journal Of University Of Anbar For Pure Science (Juaps)mentioning
confidence: 99%
“…Basic visual secret-sharing techniques eliminate the need for complex decryption calculations through the use of the Human Visual System (HVS), which can perform decryption computations and recreate secret images without the use of computers. However, modern visual secret-sharing methods now employ encryption and decryption algorithms executed by computers with simplified calculations [8].…”
Section: Journal Of University Of Anbar For Pure Science (Juaps)mentioning
confidence: 99%
See 1 more Smart Citation
“…Improving the visual quality of recovered secret image was investigated in [11]- [13]. Other applications of VC can be found in [14] and [15]. But pixel expansion and poor image quality problems remain in the above-mentioned VC.…”
Section: Introductionmentioning
confidence: 97%