2005
DOI: 10.1093/comjnl/bxh152
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic Visual Cryptography Schemes

Abstract: Visual cryptography schemes allow the encoding of a secret image, consisting of black or white pixels, into n shares which are distributed to the participants. The shares are such that only qualified subsets of participants can 'visually' recover the secret image. The secret pixels are shared with techniques that subdivide each secret pixel into a certain number m, m ≥ 2 of subpixels. Such a parameter m is called pixel expansion. Recently Yang introduced a probabilistic model. In such a model the pixel expansi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
72
0

Year Published

2006
2006
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 193 publications
(72 citation statements)
references
References 17 publications
0
72
0
Order By: Relevance
“…In 2007, Chen et al [3] extended the results to gray-scale images and proposed a gray-scale VCS scheme with the goal of no pixel expansion. Although, their scheme does not support colored images and only supports (k,k) threshold setting.…”
Section: Vcs Schemes For Gray-scale Imagesmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2007, Chen et al [3] extended the results to gray-scale images and proposed a gray-scale VCS scheme with the goal of no pixel expansion. Although, their scheme does not support colored images and only supports (k,k) threshold setting.…”
Section: Vcs Schemes For Gray-scale Imagesmentioning
confidence: 99%
“…All the methods given by Hou are based on the subtractive model. Afterwards, Yang-Chen [3]proposed another algorithm that uses additive model in a probabilistic way. Finally we compare Wu-Wong-Li [4] method which is the first one satisfying all the properties with no pixel expansion.…”
Section: Introductionmentioning
confidence: 99%
“…Because the visual quality of a recovered image is degraded by a large pixel expansion, most studies try to reduce the pixel expansion [7]- [10]. For example, Yang et al [7] proposed a scheme to construct VCS with no pixel expansion using probabilistic method (PVCS).…”
Section: Introductionmentioning
confidence: 99%
“…Visual cryptography has been extensively studied; we refer the interested reader to [9] for a collection of surveys on several aspects of visual cryptography. For the goal of this paper we will be using a particular type of visual cryptography: probabilistic visual cryptography [21,10].…”
Section: Introductionmentioning
confidence: 99%