2015
DOI: 10.1016/j.ins.2014.12.046
|View full text |Cite
|
Sign up to set email alerts
|

Prevention of cheating in visual cryptography by using coherent patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…where, nw and nb are the number of pixels in the region of white pixel and the region of a black pixel respectively and m is the pixel expansion. Table 3, it is clear that the proposed scheme is better than other approaches [5][6][7][8][9]. Table 4 also shows the benefits of the proposed scheme compared to other approaches [14,15].…”
Section: Performance Analysismentioning
confidence: 84%
See 1 more Smart Citation
“…where, nw and nb are the number of pixels in the region of white pixel and the region of a black pixel respectively and m is the pixel expansion. Table 3, it is clear that the proposed scheme is better than other approaches [5][6][7][8][9]. Table 4 also shows the benefits of the proposed scheme compared to other approaches [14,15].…”
Section: Performance Analysismentioning
confidence: 84%
“…Further, Chen et al [7,8] also worked on extra verification shares. In 2015, Lin [9] worked to overcome the extra verification shares burden but it is having poor contrast of the recovered secret image. C. N Yang et al [10] have proposed another cheating prevention scheme which is based on (2, n) VSS, but it is not generalized scheme because it works on (3, n) VSS.…”
Section: Introductionmentioning
confidence: 99%
“…Privacy preservation in data mining has become an important research area with many literature surveys. In [1][2][3][4][5] the authors describes various proposed methods in visual cryptography. In [6][7][8][9], various data mining techniques with privacy preservation is discussed along with various privacy disclosure problems.…”
Section: Literature Surveymentioning
confidence: 99%
“…In 2013, Hsiao-Ching Lin et al presented a letter-based visual cryptography scheme (LVCS) where natural language letters are used to represent pixels of secret images to construct meaningful shadow images and implemented the scheme in different programming languages [6]. Furthermore, various aspects of the security of VC schemes were discussed in [7][8][9].…”
Section: Introductionmentioning
confidence: 99%