2018
DOI: 10.1016/j.jvcir.2018.07.012
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing multi-factor cheating prevention in visual cryptography based minimum (k, n)-connected graph

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…Table 3, it is clear that the proposed scheme is better than other approaches [5][6][7][8][9]. Table 4 also shows the benefits of the proposed scheme compared to other approaches [14,15]. The performance of the proposed scheme based on the required number of verification shares is shown in Figure 8.…”
Section: Performance Analysismentioning
confidence: 90%
“…Table 3, it is clear that the proposed scheme is better than other approaches [5][6][7][8][9]. Table 4 also shows the benefits of the proposed scheme compared to other approaches [14,15]. The performance of the proposed scheme based on the required number of verification shares is shown in Figure 8.…”
Section: Performance Analysismentioning
confidence: 90%
“…Because we share R, G and B colors directly, we do not need to use the bit p 9 to covey any information. Thus, this bit p 9 could be abandoned, or used as authentication bits to provide authentication capability like VC in [6] and PSIS in [10]. Collect (x 1 ...x 8 ), where x ∈ {r, g, bl}, and append the bit p 9 to form red, green, and blue shadow blocks B x where x ∈ {r, g, bl} as shown in Figure 4b.…”
Section: Extension Of (N N)-sdis To Share True Color Secret Imagementioning
confidence: 99%
“…The so-called VC [1][2][3][4][5][6] has a novel stacking-to-see property such that the involved participants can easily stack shadows to visually decode the secret through the human eye. This property makes VC applicable in many scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…Most of the VC schemes inherited two drawbacks that are high pixel expansion and low contrast, which results in lower visual quality of the recovered image. Although some methods, including linear coding [1,14], supergraph [15,16], integer linear programming method [17][18][19], and linear algebraic technique [20,21], formulated the construction of VC schemes as the mathematical model to decrease the pixel expansion, the resulting pixel expansion m is still large located in [C k n · 2 k−2 + 1, C k−1 n−1 · 2 k−1 + 1]. The resulting contrast is quite small with a value 1/m.…”
Section: Introductionmentioning
confidence: 99%