2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT) 2017
DOI: 10.1109/icecct.2017.8117849
|View full text |Cite
|
Sign up to set email alerts
|

Secure visual secret sharing scheme for color images using visual cryptography and digital watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Indeed, some trade-offs and contradictory criteria include watermarking techniques. For example, the protection of the watermark is often connected to the imperceptibility of the embedding mechanism, but at the same time, watermarks should be sufficiently robust to be detected by the detection algorithm and resist many forms of attacks, ranging from geometric manipulation to compression [27].…”
Section: Digital Watermarkingmentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, some trade-offs and contradictory criteria include watermarking techniques. For example, the protection of the watermark is often connected to the imperceptibility of the embedding mechanism, but at the same time, watermarks should be sufficiently robust to be detected by the detection algorithm and resist many forms of attacks, ranging from geometric manipulation to compression [27].…”
Section: Digital Watermarkingmentioning
confidence: 99%
“…In the latter case, in access systems, eligible subsets of participants are arranged. In both cases, by building on the previous proposed model, the merged schemes can be easily expanded, altering only the included VC scheme [35].…”
Section: Watermarking With (K N)-vc Schemementioning
confidence: 99%
“…For getting back the original text, the allowed users have the required key to decrypt the message and ensure that it can be read. Also, in cryptography, the strength of an encryption's unpredictability is investigated, making it more difficult for anyone outside the organization or the system to determine the algorithm's key or input [11].…”
Section: Issn: 2252-8814 mentioning
confidence: 99%
“…VC technique uses the Boolean operation to generate shares[10], [11]. The pixel values of the secret image (I) and random matrix (K) are used to generate the resultant matrix (R).…”
Section: A Boolean Based Visual Cryptography For the Share Creation mentioning
confidence: 99%