2014
DOI: 10.1117/12.2064154
|View full text |Cite
|
Sign up to set email alerts
|

A halftone visual cryptography schema using ordered dither

Abstract: Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. This paper proposes a schema of information hiding within the method of visual cryptography. The gray image is changed into two halftone images via the different dither matrixes respectively, and the secret binary pixels are encoded into shares. The secret information can be restored by stacking the differen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…Less shares accumulated than t will prevent the concealed image from being viewed. The (t, n)-VCS ((t, n)-threshold visual cryptography system) is the name given to this [9]. Consider the basic two-out of-two visual threshold method, in which each image pixel is stored into a pair of subpixels in each of the two shares.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Less shares accumulated than t will prevent the concealed image from being viewed. The (t, n)-VCS ((t, n)-threshold visual cryptography system) is the name given to this [9]. Consider the basic two-out of-two visual threshold method, in which each image pixel is stored into a pair of subpixels in each of the two shares.…”
Section: Methodsmentioning
confidence: 99%
“…Due to their speed and simplicity, QR codes have found significant usage in a number of crucial sectors, including health, education, and finance [4,5,6,7,8]. There are a number of secure QR-based online payment options available [9][10][11][12][13][14][15]. Each of the several payment alternatives offered by [9] offers differing levels of security and quickness.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The detailed principle of visual encryption is that the secret image is divided into several share images by cryptographic operations and distributed to different participants. The pixels of each share image appear to be randomly distributed [8]. Decryption is possible by stacking an adequate number of shares.…”
Section: Visual Cryptographymentioning
confidence: 99%