Threshold Visual Cryptography Schemes With Tagged Shares
نویسندگان
چکیده
منابع مشابه
Contrast Optimal Threshold Visual Cryptography Schemes
A (k; n)-threshold visual cryptography scheme ((k; n)-threshold VCS, for short) is a method to encode a secret image SI into n shadow images called shares such that any k or more shares enable the \visual" recovery of the secret image, but by inspecting less that k share one cannot gain any information on the secret image. The \visual" recovery consists of xeroxing the shares onto transparencie...
متن کاملAuthenticating Visual Cryptography Shares Using 2D Barcodes
One of the problems pertinent with many visual cryptography (VC) schemes is that of authentication. VC provides a way of sharing secrets between a number of participants. The secrets are in the form of an image that is encoded into multiple pieces known as shares. When these shares are physically superimposed, the secret can be instantly observed. A known problem is that of authentication. How ...
متن کاملProbabilistic Visual Cryptography Schemes
Visual cryptography schemes allow the encoding of a secret image, consisting of black or white pixels, inton shares which are distributed to the participants. The shares are such that only qualified subsets of participants can ‘visually’ recover the secret image. The secret pixels are shared with techniques that subdivide each secret pixel into a certain number m, m ≥ 2 of subpixels. Such a par...
متن کاملExtended visual cryptography schemes
Abstract. Visual cryptography schemes have been introduced in 1994 by Naor and Shamir. Their idea was to encode a secret image into n shadow images and to give exactly one such shadow image to each member of a group P of n persons. Whereas most work in recent years has been done concerning the problem of qualified and forbidden subsets of P or the question of contrast optimizing, in this paper ...
متن کاملMulti-pixel Visual Cryptography for color images with Meaningful Shares
Visual cryptography technique for black and white images (Basic) introduced by Naor and Shamir [1]. Any visual secret information ( pictures, text, etc) is considered as image and encryption is performed using simple algorithm to generate n copies of shares depending on type of access structure schemes[2, 6].The simplest access structure is the 2 out of 2 scheme where the secret image is encryp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.3000308