2006
DOI: 10.1117/1.2193912
|View full text |Cite
|
Sign up to set email alerts
|

Visual cryptography with extra ability of hiding confidential data

Abstract: We present a two-in-one visual cryptography (VC) scheme that not only shares an image of moderate confidentiality between two noisy transparencies, but also hides in these two transparencies a more confidential text file describing the image. None of the transparencies alone can reveal anything about the image or text. Later, people can view the image by simply stacking the two transparencies; on the other hand, after certain simple computations, the more confidential text data can also be extracted. We also i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
26
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(32 citation statements)
references
References 25 publications
0
26
0
Order By: Relevance
“…Visual cryptography with extra ability of hiding confidential data [8] In Fang and Lins' scheme, it not only shares secret image by two noisy share images, but also hides an extra confidential data for authentication. People who gather the two share images can reveal the secret image by stacking the two share images.…”
Section: 2mentioning
confidence: 99%
See 3 more Smart Citations
“…Visual cryptography with extra ability of hiding confidential data [8] In Fang and Lins' scheme, it not only shares secret image by two noisy share images, but also hides an extra confidential data for authentication. People who gather the two share images can reveal the secret image by stacking the two share images.…”
Section: 2mentioning
confidence: 99%
“…Section 2 reviews the related works of error diffusion halftone techniques, visual cryptography with extra ability of hiding confidential data [8], and new data hiding scheme using pixel swapping [2]. Section 3 describes the proposed visual secret sharing for modifying diffusion, secret sharing based on pixel swapping to provide authentication, the process to enhance the quality of share image by modifying diffusion, and the proposed color visual secret sharing.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The comparisons between our ESSVCS and the TiOISSS will be given in Section 4. Fang et al [5,21] also tried to make use of the pseudo-random inputs to carry confidential data. Unfortunately, the scheme is only for (2,2) access structure.…”
Section: Introductionmentioning
confidence: 99%