Penrose tiling for visual secret sharing

被引:5
|
作者
Yan, Xuehu [1 ,2 ]
Yan, Wei Qi [3 ]
Liu, Lintao [1 ,2 ]
Lu, Yuliang [1 ,2 ]
机构
[1] Natl Univ Defense Technol, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awaren, Hefei 230037, Peoples R China
[3] Auckland Univ Technol, Auckland 1142, New Zealand
基金
中国国家自然科学基金;
关键词
Image sharing; Visual secret sharing; Penrose tiling; Vector image; CRYPTOGRAPHY SCHEME; RECOVERY;
D O I
10.1007/s11042-020-09568-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual secret sharing (VSS) has the advantage that the decryption is based on our human visual system without participation of any computational devices. However, traditional VSS schemes are only for sharing raster images with regard to pixels, which lead to that the secret image will be aliased when enlarged and its pixels are shared in rectangular way only. In this paper, we will introduce a VSS scheme for vectorized images based on Penrose tiling. Penrose tiling is with the merits of vectorization and nonperiodicity. These properties are applied to the proposed scheme so as to share those vectorized images; the basic unit of secret sharing could be any graphical shapes instead of pixels or rectangular regions only in the traditional methods. Our experiments show the effectiveness of the proposed scheme.
引用
收藏
页码:32693 / 32710
页数:18
相关论文
共 50 条
  • [1] Penrose tiling for visual secret sharing
    Xuehu Yan
    Wei Qi Yan
    Lintao Liu
    Yuliang Lu
    Multimedia Tools and Applications, 2020, 79 : 32693 - 32710
  • [2] Diffusive Limits on the Penrose Tiling
    Telcs, A.
    JOURNAL OF STATISTICAL PHYSICS, 2010, 141 (04) : 661 - 668
  • [3] Diffusive Limits on the Penrose Tiling
    A. Telcs
    Journal of Statistical Physics, 2010, 141 : 661 - 668
  • [4] A privilege-based visual secret sharing model
    Hou, Young-Chang
    Quan, Zen-Yu
    Tsai, Chih-Fong
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 33 : 358 - 367
  • [5] Visual secret sharing for multiple secrets
    Feng, Jen-Bang
    Wu, Hsien-Chu
    Tsai, Chwei-Shyong
    Chang, Ya-Fen
    Chu, Yen-Ping
    PATTERN RECOGNITION, 2008, 41 (12) : 3572 - 3581
  • [6] Visual Secret Sharing with Meaningful Shares
    Shyu, Shyong Jian
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 576 - 580
  • [7] Visual Secret Sharing Without Pixel Expansion
    Sagheer, Ali Makki
    Abed, Laith Hamid
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2015, 7 (02) : 20 - 30
  • [8] MULTIPLE WATERMARKING BASED ON VISUAL SECRET SHARING
    Chen, Tzung-Her
    Hung, Tsung-Hao
    Horng, Gwoboa
    Chang, Chia-Ming
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (11): : 3005 - 3026
  • [9] Text-Based Visual Secret Sharing
    Fang, Wen-Pinn
    Hsu, Jia-Hao
    Cheng, Wei-chi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (05): : 38 - 40
  • [10] Visual secret sharing with cheating prevention revisited
    Chen, Yu-Chi
    Tsai, Du-Shiau
    Horng, Gwoboa
    DIGITAL SIGNAL PROCESSING, 2013, 23 (05) : 1496 - 1504