Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation

被引:34
作者
Yang, CN [1 ]
Chen, TS [1 ]
机构
[1] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien, Taiwan
关键词
visual secret sharing; visual cryptography; secret image sharing;
D O I
10.1016/j.patcog.2006.01.013
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An aspect ratio invariant visual secret sharing (ARIVSS) scheme is a perfectly secure method for sharing secret images. Due to the nature of the VSS encryption, each secret pixel is expanded to in sub-pixels in each of the generated shares. The advantage of ARMS is that the aspect ratio of the recovered secret image is fixed and thus there is no loss of information when the shape of the secret image is our information. For example, a secret image of a circle is compromised to an ellipse if in does not have a square value. Two ARMS schemes based on processing one and four pixel blocks, respectively, were previously proposed. In this paper, we have generalized the square block-wise approach to further reduce pixel expansion. (c) 2006 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:1300 / 1314
页数:15
相关论文
共 14 条
[1]   Optimal colored threshold visual cryptography schemes [J].
Cimato, S ;
De Prisco, R ;
De Santis, A .
DESIGNS CODES AND CRYPTOGRAPHY, 2005, 35 (03) :311-335
[2]   Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels [J].
Eisen, PA ;
Stinson, DR .
DESIGNS CODES AND CRYPTOGRAPHY, 2002, 25 (01) :15-61
[3]   A new multi-secret images sharing scheme using Largrange's interpolation [J].
Feng, JB ;
Wu, HC ;
Tsai, CS ;
Chu, YP .
JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 76 (03) :327-339
[4]  
Gonzalez R., 2019, Digital Image Processing, V2nd
[5]   Visual cryptography for color images [J].
Hou, YC .
PATTERN RECOGNITION, 2003, 36 (07) :1619-1629
[6]  
Ito R, 1999, IEICE T FUND ELECTR, VE82A, P2172
[7]   Winscale: An image-scaling algorithm using an area pixel model [J].
Kim, CH ;
Seong, SM ;
Lee, JA ;
Kim, LS .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (06) :549-553
[8]   Visual cryptography for gray-level images by dithering techniques [J].
Lin, CC ;
Tsai, WH .
PATTERN RECOGNITION LETTERS, 2003, 24 (1-3) :349-358
[9]   Bit-level based secret sharing for image encryption [J].
Lukac, R ;
Plataniotis, KN .
PATTERN RECOGNITION, 2005, 38 (05) :767-772
[10]  
Naor M., 1995, LECT NOTES COMPUTER, P1, DOI DOI 10.1007/BFB0053419