Sharing a verifiable secret image using two shadows
From MaRDI portal
Publication:2270788
DOI10.1016/j.patcog.2009.04.012zbMath1175.68507OpenAlexW2037463248MaRDI QIDQ2270788
Publication date: 29 July 2009
Published in: Pattern Recognition (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.patcog.2009.04.012
clusteringvisual secret sharingerror diffusioninverse halftoning\((7, 4)\) Hamming codeverifiable secret image
Computing methodologies for image processing (68U10) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Unnamed Item
- Visual cryptography for grey level images
- A cheating prevention scheme for binary visual cryptography with homogeneous secret images
- Sharing secrets in stego images with authentication
- Efficient visual secret sharing scheme for color images
- Two secret sharing schemes based on Boolean operations
- A multiple-level visual secret-sharing scheme without image size expansion
- A fast image encryption system based on chaotic maps with finite precision representation
- Cheating in visual cryptography
- How to share a secret
- Cheating Immune (2,n)-Threshold Visual Secret Sharing
- Progress in Cryptology - INDOCRYPT 2003
This page was built for publication: Sharing a verifiable secret image using two shadows