Video Encryption by Using Visual Cryptography Based on Wang's Scheme

被引:0
|
作者
Munir, Rinaldi [1 ]
Harlili [1 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat, Bandung, Indonesia
来源
2018 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND SYSTEM ENGINEERING (ICEESE) | 2018年
关键词
visual cryptography; video; Wang's scheme;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Visual cryptography could be used to encrypt secret video so that each participant has their own share in encrypted form. The encrypted video could be played. To recover the original video, all participants have to join their shares. In this paper, we developed a method to encrypt video by using Wang's scheme. If the secret video has the audio, then the scheme is applied to each frame. The audio could be combined to each share or not. Experiment results show that the scheme could be applied very well to video. The recovered video is same exactly with the original video.
引用
收藏
页码:17 / 22
页数:6
相关论文
共 50 条
  • [1] Robust Video Watermarking Scheme Based on Visual Cryptography
    Singh, Th. Rupachandra
    Singh, Kh. Manglem
    Roy, Sudipta
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 872 - 877
  • [2] Video watermarking scheme based on visual cryptography and scene change detection
    Singh, Th. Rupachandra
    Singh, Kh. Manglem
    Roy, Sudipta
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2013, 67 (08) : 645 - 651
  • [3] A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme
    Lakshmeeswari, G.
    Lakshmi, D. Rajya
    Srinivas, Y.
    Bindu, G. Hima
    ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 2, 2013, 177 : 511 - 520
  • [4] A Visual Information Encryption Scheme Based on Visual Cryptography and D-H Key Agreement Scheme
    Chan, Chao-Wen
    Wu, Yi-Da
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (04): : 128 - 132
  • [5] An Anti-Cheating Visual Cryptography Scheme Based on Chaotic Encryption System
    Han, Yanyan
    Xu, Zhuolin
    Ge, Xiaonan
    He, Wencai
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED MECHANICS, MECHATRONICS AND INTELLIGENT SYSTEMS (AMMIS2015), 2016, : 581 - 587
  • [6] Secret Encryption Using (2,2) Visual Cryptography Scheme with DCT Compression
    Ravella, Yamini
    Chavan, Pallavi
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 344 - 349
  • [7] Evaluation of correlation in optical encryption by using visual cryptography
    Yi, SY
    Ryu, CS
    Ryu, DH
    Lee, SH
    OPTICAL PATTERN RECOGNITION XII, 2001, 4387 : 238 - 246
  • [8] Encryption of optical image using BCGH and visual cryptography
    Yi, SY
    Ryu, CS
    Kim, DG
    Lee, SH
    18TH CONGRESS OF THE INTERNATIONAL COMMISSION FOR OPTICS: OPTICS FOR THE NEXT MILLENNIUM, TECHNICAL DIGEST, 1999, 3749 : 276 - 277
  • [9] Visual cryptography based on optical interference encryption technique
    Seo, DH
    Kim, JY
    Lee, SS
    PHOTONIC AND QUANTUM TECHNOLOGIES FOR AEROSPACE APPLICATIONS III, 2001, 4386 : 172 - 180
  • [10] An asymmetric watermarking scheme based on visual cryptography
    Hou, YC
    Chen, PM
    2000 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I-III, 2000, : 992 - 995