2011 3rd International Conference on Electronics Computer Technology 2011
DOI: 10.1109/icectech.2011.5941725
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced image secret sharing via error diffusion in halftone visual cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…It is based on mean squared error (MSE). It is commonly used as a quantitative metric in general image quality assessment and in visual secret sharing [7,8].…”
Section: Objective Image Quality Metricsmentioning
confidence: 99%
See 2 more Smart Citations
“…It is based on mean squared error (MSE). It is commonly used as a quantitative metric in general image quality assessment and in visual secret sharing [7,8].…”
Section: Objective Image Quality Metricsmentioning
confidence: 99%
“…Compared with PSNR and MSE, the advantage of SSIM, as shown in Eq. (7), is that the relationship among pixel neighbors are taken into consideration. SSIM is treated as another commonly applied tool of quality evaluation in image processing and image encryption [26][27][28].…”
Section: Objective Image Quality Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…Alex et al [11] suggested various methods for error diffusion in order to increase the quality of the image in the halftone shares. The halftone visual cryptographic is used to fit snugly the pixels of secret information into previously encoded halftone shares.…”
Section: Using Secret Sharing Mechanism To Secure Imagesmentioning
confidence: 99%
“…The chosen matrix defines the color of the m subpixels in each one of the shares. Based on the above principle, many papers have explored various aspects: general access structure [3][4], pixel expansion [5][6], contrast [7], randomness [8], multiple secrets [9], color image [10], cheating prevention [11][12], meaningful shares [13][14] and other issues [15][16]. Different from the above-mentioned schemes, which are now called deterministic schemes, a probabilistic scheme, which was introduced by Yang [17] to relieve the concern of pixel expansion, recover the secret pixel with a certain probability instead of a deterministic difference.…”
Section: Introductionmentioning
confidence: 99%