10th International Conference on Information Technology (ICIT 2007) 2007
DOI: 10.1109/icoit.2007.4418265
|View full text |Cite
|
Sign up to set email alerts
|

Recursive Visual Cryptography Using Random Basis Column Pixel Expansion

Abstract: In this paper we present a new method for a visual cryptography scheme that uses random basis column pixel expansion technique. This method encoded the secret image into 'n' share images in a recursive manner, which have dimensions identical to the secret image. In this scheme, the encoded n shares further encoded into number of subshares recursively. It will increase the level of security of the encrypted message. 10th International Conference on Information Technology 0-7695-3068-0/07 $25.00 © 2007 IEEE DOI … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
3
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 1 publication
1
3
0
Order By: Relevance
“…With this key space, it is possible to generate very large number of keys which addresses the challenge of revocability. Also in the proposed scheme the expected entropy of transformed biometric template stored using chaotic maps is about 0.9991 [67][68][69][70][71][72][73][74][75][76], which is close to the theoretical value (=1). This property provides privacy and security by providing it impossible to guess the keys.…”
Section: Very Large Key Space and High Entropy Addresses The Revocabisupporting
confidence: 55%
“…With this key space, it is possible to generate very large number of keys which addresses the challenge of revocability. Also in the proposed scheme the expected entropy of transformed biometric template stored using chaotic maps is about 0.9991 [67][68][69][70][71][72][73][74][75][76], which is close to the theoretical value (=1). This property provides privacy and security by providing it impossible to guess the keys.…”
Section: Very Large Key Space and High Entropy Addresses The Revocabisupporting
confidence: 55%
“…Fingerprint and face image are used in [15] during authentication. Applying XOR operation recursively to construct complex shares was introduced in [21]. Authors in [2] have proposed Boolean-based multi-secret image sharing scheme for sharing n images secretly.…”
Section: Related Workmentioning
confidence: 99%
“…The shares of Visual Cryptography are printed on transparencies which need to be superimposed. A Visual Cryptography method proposed by T. Monoth et al, [7] uses random basis column pixel expansion technique. The encoded shares are further encoded into number of sub shares recursively which is computationally complex.…”
Section: Related Workmentioning
confidence: 99%