2016
DOI: 10.1016/j.tcs.2015.09.016
|View full text |Cite
|
Sign up to set email alerts
|

Extended color visual cryptography for black and white secret image

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…Privacy preservation in data mining has become an important research area with many literature surveys. In [1][2][3][4][5] the authors describes various proposed methods in visual cryptography. In [6][7][8][9], various data mining techniques with privacy preservation is discussed along with various privacy disclosure problems.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Privacy preservation in data mining has become an important research area with many literature surveys. In [1][2][3][4][5] the authors describes various proposed methods in visual cryptography. In [6][7][8][9], various data mining techniques with privacy preservation is discussed along with various privacy disclosure problems.…”
Section: Literature Surveymentioning
confidence: 99%
“…(1) = Row 0 to Row 31 and M 32 (1) =Col 8 to Col 11 and so on as shown in figure 3. The concurrent operation timing diagram in shown in figure 5.…”
Section: Figure 2 N X N Image With Four Partitionsmentioning
confidence: 99%
“…Hence, it is necessary to generate meaningful shares to reduce the likelihood of shares being suspected. To this end, Yang et al [38] proposed an extended CBW-VCS, in which they introduced several construction algorithms to generate meaningful color shares for diferent threshold schemes. Through the combination of CBW-VCS with polynomial based secret image sharing, a novel (k, n) threshold secret image sharing (SIS) scheme [32] with two decoding options was brought forward.…”
Section: Introductionmentioning
confidence: 99%
“…e follow-up research work of RGVCS mainly focuses on a (k, n) threshold [10] and improves image recovered quality [11]. Many other schemes were proposed to realize diversified visual sharing such as halftone secret images [12], grayscale secret images [13], and color secret images [14]. Moreover, some VC extension methods have also been proposed [11,15,16].…”
Section: Introductionmentioning
confidence: 99%