Using multi-ringed shadow image of visual cryptography to hide more secret messages

被引:11
作者
Chen, J. [1 ]
Chen, T-S [1 ]
Hsu, H-C [2 ]
Lin, Y-H [3 ]
机构
[1] Natl Taichung Inst Technol, Grad Sch Comp Sci & Informat Technol, Taichung 404, Taiwan
[2] Natl Taichung Inst Technol, Dept Comp Sci & Informat Engn, Taichung 404, Taiwan
[3] Natl Taichung Inst Technol, Dept Informat Management, Taichung 404, Taiwan
关键词
visual cryptography; secret sharing; circular visual cryptography; cylindrical visual cryptography;
D O I
10.1179/174313108X384656
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
In this paper, we introduce a novel multi-ringed visual cryptography technique to hide secret messages on cylindrical surfaces of shares. Different secrets were hidden on the surface by fixed-angle segmentation. Four different secret messages were hidden such that the first two secrets can be revealed by stacking the hollow cylinders and rotating at a fixed angle and the next two, revealed by flipping one shadow image, stacked together and rotating at a fixed angle. The proposed method is novel for its simple hiding, data security and easy implementation.
引用
收藏
页码:101 / 108
页数:8
相关论文
共 8 条
[1]   Extended capabilities for visual cryptography [J].
Ateniese, G ;
Blundo, C ;
De Santis, A ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) :143-161
[2]   New visual cryptography system based on circular shadow image and fixed angle segmentation [J].
Chen, J ;
Chen, TS ;
Hsu, HC ;
Chen, HW .
JOURNAL OF ELECTRONIC IMAGING, 2005, 14 (03) :1-5
[3]  
Lukac R, 2004, 2004 IEEE 6TH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, P351
[4]  
LUKAC R, 2004, P 12 EUR SIGN PROC C, P1493
[5]  
Naor M., 1995, LECT NOTES COMPUTER, V13, P1, DOI [10.1007/BFb0053419, DOI 10.1007/978-1-4939-9484-7_1, DOI 10.1007/BFB0053419]
[6]  
NAOR M, 1997, P 17 ANN INT CRYPT C, P322
[7]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[8]   Sharing multiple secrets in digital images [J].
Tsai, CS ;
Chang, CC ;
Chen, TS .
JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 64 (02) :163-170