2020
DOI: 10.1007/s00371-020-01883-9
|View full text |Cite
|
Sign up to set email alerts
|

Extended visual cryptography-based copyright protection scheme for multiple images and owners using LBP–SURF descriptors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 32 publications
0
8
0
Order By: Relevance
“…to have been encoded in just such a way that perhaps the decoded results indicate mostly as a visual object. A few of the bestknown methods were recognized as "Moni Naor and Adi Shamir", which formed that in 1994 [12]. Steganography approaches can be exploited by two groups of people: those in the Image Domain and those in the Transform Coefficients.…”
Section: Visual Cryptography and Methods Challengesmentioning
confidence: 99%
“…to have been encoded in just such a way that perhaps the decoded results indicate mostly as a visual object. A few of the bestknown methods were recognized as "Moni Naor and Adi Shamir", which formed that in 1994 [12]. Steganography approaches can be exploited by two groups of people: those in the Image Domain and those in the Transform Coefficients.…”
Section: Visual Cryptography and Methods Challengesmentioning
confidence: 99%
“…This indicates the superiority of our proposed forgery detection approach in comparison with other recent research works in the literature. Table 6, below, shows the qualitative comparison of our proposed approach with state-of-the-art approaches: (1) Liu et al [43], (2) Amiri et al [44], (3) Kukreja et al [45], (4) Kumar and Hensman [46], and (5) Kumar et al [47]. The results of this table indicate that the proposed approach has more cons (or positive characteristics) than the other compared approaches.…”
Section: Third Group Of Experiments (Comparative Analysis)mentioning
confidence: 97%
“…In this group of experiments, the proposed approach was compared with state-ofthe-art approaches. More recent related works in the literature are used in our comparison, as shown in Figure 8: (1) Liu et al [43], (2) Amiri et al [44], and (3) Kukreja et al [45]. The NC and TAF metrics are used to evaluate the performance of the compared approaches.…”
Section: Third Group Of Experiments (Comparative Analysis)mentioning
confidence: 99%
“…As previously mentioned, the main advantage for this technique is increased security as compared to traditional VC through the construction of meaningful shares [49,67,91,105]. EVC is useful for applications such as copyright protection because the same watermark can be embedded in each meaningful share and recovered when combined with a master share [52]. It also has higher contrast levels than traditional VC.…”
Section: Type Of Sharesmentioning
confidence: 99%
“…Schemes that achieve a good quality of recovered image suffer from high computational or memory complexity [88,90,95] whereas schemes that are computationally efficient have recovered images that have poor contrast or resolution [12,77]. Apart from decryption quality, schemes that support meaningful shares also generally have complexity issues [24,52,101].…”
Section: Comparison Of Visual Cryptography Schemesmentioning
confidence: 99%