2020
DOI: 10.3390/app10041321
|View full text |Cite
|
Sign up to set email alerts
|

A Novel XOR-Based Threshold Visual Cryptography with Adjustable Pixel Expansion

Abstract: A (k, n) visual cryptography (VC) scheme encodes a secret image into n shadows that are printed on transparencies distributed among a group of n participants secretly, and reveal the secret image by stacking no less than k of them. Its decryption requires no computation and attracts much attention in image security applications. The pixel expansion and contrast are two important characteristics to evaluate the visual quality of the revealed secret image for a (k, n)-VC scheme. The (k, n) XOR-based VC (XVC) sch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 26 publications
0
9
0
Order By: Relevance
“…Comparative analysis of the various online voting systems: Objectives, techniques, and algorithms (Table 1). Voting via the internet, keeping track of the system, designing proper security goals, maintaining transparency while compared to the present work, making the work a success [9], and bringing over accurate results.…”
Section: Literature Surveymentioning
confidence: 96%
“…Comparative analysis of the various online voting systems: Objectives, techniques, and algorithms (Table 1). Voting via the internet, keeping track of the system, designing proper security goals, maintaining transparency while compared to the present work, making the work a success [9], and bringing over accurate results.…”
Section: Literature Surveymentioning
confidence: 96%
“…Table 1 shows a comparison between the schemes that are proposed by Shen et al, 24 Shyu, 26 and Guo et al, 27 and this article, which mainly consider the pixel expansion, contrast, and computation complexity problems. The size of the reconstructed image is equal to that one of secret image if its pixel expansion is zero.…”
Section: Examplesmentioning
confidence: 99%
“…24 However, these XVCSs include many complex computation processes to construct the basis matrices, and the pixel expansion problems do not be completely avoided. 27…”
Section: Introductionmentioning
confidence: 99%
“…Although their proposed scheme can eliminate pixel expansion entirely, there exists colored background noise in the recovered images. The scheme proposed by [34] approached the pixel expansion problem from a different perspective by proposing an XOR-based threshold VC scheme with adjustable pixel expansion. Their scheme was able to achieve the same average contrast regardless of the pixel expansion value.…”
Section: Binary Imagesmentioning
confidence: 99%
“…Quite a number of VC schemes have addressed pixel expansion, notably within the past 3 years [24,34,66,101,109]. However, this is at the expense of increased computational or memory complexity.…”
Section: Comparison Of Visual Cryptography Schemesmentioning
confidence: 99%