Proceedings of 2010 IEEE International Symposium on Circuits and Systems 2010
DOI: 10.1109/iscas.2010.5537511
|View full text |Cite
|
Sign up to set email alerts
|

Resolution variant visual cryptography for street view of Google Maps

Abstract: Resolution variant visual cryptography takes the idea of using a single share of visual cryptography (VC) to recover a secret from an image at multiple resolutions. That means, viewing the image on a one-to-one basis and superimposing the share will recover the secret. However, if the image is zoomed, using that same share we can recover other secrets at different levels. The same share is used at these varying resolutions in order to recover a large amount of hidden secrets. This process is quite similar to w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…Recently, various studies about visual cryptography are proposed. Some has proposed a method for splitting the image into two different shares and some proposed on pixel quality enhancement [11][13], original image transmission or secret image transmission [12]. On the other hand, there have been also many reports for productions of meaningful binary halftone share images [14].Fu and Au have dealt with binary or ternary images like text images as secret image [8], while other many researchers have studied about natural gray-scale images like photographs as secret image and image as keys [9], [10].…”
Section: Segment Displaymentioning
confidence: 99%
“…Recently, various studies about visual cryptography are proposed. Some has proposed a method for splitting the image into two different shares and some proposed on pixel quality enhancement [11][13], original image transmission or secret image transmission [12]. On the other hand, there have been also many reports for productions of meaningful binary halftone share images [14].Fu and Au have dealt with binary or ternary images like text images as secret image [8], while other many researchers have studied about natural gray-scale images like photographs as secret image and image as keys [9], [10].…”
Section: Segment Displaymentioning
confidence: 99%
“…A rather unique way of looking at the multiple secret sharing problem in a practical way is detailed within [11]. The authors take the idea of sharing multiple secrets and apply it to Google's Street View implementation used within Google Maps.…”
Section: Related Workmentioning
confidence: 99%
“…The scheme in [11] uses a recursive secret sharing scheme which caters for the multiple zoom levels which are supported by Google Maps. After the recursive shares have been embedded, superimposing the corresponding share reveals the secret.…”
Section: Related Workmentioning
confidence: 99%
“…The underlying operation of the stacking is the logic OR. Lots of research focused on the novel applications of VCS [2][3][4][5]. Recently, some books covered an extensive range of topics related to VCS [6][7][8].…”
Section: Introductionmentioning
confidence: 99%