2021
DOI: 10.1155/2021/3287774
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Raster Map Exchange Scheme Based on Visual Cryptography

Abstract: Raster map is an image that has been discretized in space and brightness, and it is an important carrier of geospatial data. With the rapid development of Internet and big data technologies, preserving the privacy of raster map has become an urgent task. To solve these issues, we propose a novel extended visual cryptography scheme to securely store a raster map into other two meaningful halftone maps in the paper. The scheme avoids the random-looking shares of visual cryptography schemes which are vulnerable a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…Because the grid map [33, 34] is simple, effective and easy to implement, the grid method is used to model the environment of the mobile robot’s running space, and the size and number of grids are determined by comparing the size of obstacles and the size of the robot’s running space. Figure 2 shows the map model used in this paper.…”
Section: Establishment Of Environmental Modelmentioning
confidence: 99%
“…Because the grid map [33, 34] is simple, effective and easy to implement, the grid method is used to model the environment of the mobile robot’s running space, and the size and number of grids are determined by comparing the size of obstacles and the size of the robot’s running space. Figure 2 shows the map model used in this paper.…”
Section: Establishment Of Environmental Modelmentioning
confidence: 99%
“…As our transmission scheme only carries out simple Boolean operations, its encryption transmission performance is equivalent to that of normal images, about 8 times faster than TLS. As shown in Table 2, because there are so many images in the dataset, we randomly selected 10 images from the UCMercd dataset [43]. UCMerced is a classic remote sensing scene recognition dataset used to classify land-use scenarios in urban areas.…”
Section: Experiments and Discussionmentioning
confidence: 99%
“…In the original EVCS, to encrypt a single pixel, it needs a sub-pixel composed of multiple pixels for secret sharing. A common method is block-wise encryption 14 , 15 for eliminating pixel expansion. The basic idea of block encryption is to encrypt by sharing blocks whose size is equal to that of the secret block.…”
Section: Qevcs: a Qr Code-based Expansion-free Extended Visual Crypto...mentioning
confidence: 99%
“…The aforementioned schemes cannot restore the secret image by simply superimposing images like the original VCS due to the XOR operation. However, it is still expected to reveal images directly through HVS in many scenarios including medical images and paper maps 14 . Our scheme can be applied to these scenes without cryptographic computation.…”
Section: Introductionmentioning
confidence: 99%