2018
DOI: 10.1007/s11042-018-5724-z
|View full text |Cite
|
Sign up to set email alerts
|

An Optimized Halftone Visual Cryptography Scheme Using Error Diffusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…Share1 Share 2 Staking of Share1 & Share2 While creating and combining the shares some problems such as pixel expansion, alignment problem, flipping Issues, and share distortion, cheating of shares may arise [5], [6]. In pixel expansion numbers of pixel in share are increased, due to that size of share increases and alignment problems may occurs.…”
Section: Original Imagementioning
confidence: 99%
See 1 more Smart Citation
“…Share1 Share 2 Staking of Share1 & Share2 While creating and combining the shares some problems such as pixel expansion, alignment problem, flipping Issues, and share distortion, cheating of shares may arise [5], [6]. In pixel expansion numbers of pixel in share are increased, due to that size of share increases and alignment problems may occurs.…”
Section: Original Imagementioning
confidence: 99%
“…Mahmoud E. Hodeish et.al proposed an optimized half tone visual cryptography using error diffusion. They works on binary and gray scale image and improves the pixel expansion, elements the code book requirement but they only works on binary half tone images [6]. Mahmoud E. Hodeish et.al proposed a new efficient TKHC-based image sharing scheme over unsecured channel they proposed the method of RGB and gray scale images encrypted and decrypted by means of TKHC and providing strong security to transmit all the generated shares via one public channel [9].…”
Section: Related Workmentioning
confidence: 99%
“…The figure (7) shows the difference between the original image and the encrypted image. To determine this difference, we must use the following measurements [19,20,21].…”
Section: Implementation and Analysis By Matlabmentioning
confidence: 99%
“…The remarkable progress in the development of data production has made data processing difficult [1]. However, due to the rapid development in environmental technologies, the transmission of sensitive information through the internet has become easy using the new technologies that come under big data today [2], [3]. Where it became an important and modern topic racing towards researchers as a rich field of research areas and come out with the most prominent researches and thoughts and innovative ways to deal with the problem and cover its gaps [4].…”
Section: Introductionmentioning
confidence: 99%