2018
DOI: 10.1080/19393555.2019.1567872
|View full text |Cite
|
Sign up to set email alerts
|

Visual cryptographic techniques for secret image sharing: a review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 82 publications
0
5
0
Order By: Relevance
“…These schemes have been utilized in numerous applications such as biometric privacy, online payment systems, anti-phishing frameworks, and authentication based on signature, as summarized in [4]. Moreover, a very recent work [7] reviewed various visual cryptographic schemes based on different pieces of research related to this area, and cited the relevant literature. Furthermore, different VC schemes have been compared in terms of various performance criteria such as pixel expansion, visual quality and security.…”
Section: Related Workmentioning
confidence: 99%
“…These schemes have been utilized in numerous applications such as biometric privacy, online payment systems, anti-phishing frameworks, and authentication based on signature, as summarized in [4]. Moreover, a very recent work [7] reviewed various visual cryptographic schemes based on different pieces of research related to this area, and cited the relevant literature. Furthermore, different VC schemes have been compared in terms of various performance criteria such as pixel expansion, visual quality and security.…”
Section: Related Workmentioning
confidence: 99%
“…The VSS schemes based on XOR recovery solve the problems of the requirement of alignment in the decryption phase and complex computation. 18,19,20 In 2007, Wang et al presented a method for visual secret sharing using Boolean operations. 21 In their method, according to the input secret image 𝑆 and the number of shares which is 𝑛, 𝑛 + 1 random matrix is generated (𝐵 1 , ...., 𝐵 𝑛+1 ).…”
Section: Introductionmentioning
confidence: 99%
“…The basic idea is to replace each pixel in an image with a block of pixels. The pixel information in the pixel block is filled with the superposition between pixels, and finally, an encrypted image cannot be recognized by the human eye [4][5][6][7][8][9][10][11][12][13]. For a (k, k)-threshold scheme, the information transmitting end encrypts the secret image into k share images and transmits them to the receiving end.…”
Section: Introductionmentioning
confidence: 99%
“…Since each secret pixel can be rendered by a block of pixels in a recovered image, ordinary visual cryptography has better visual quality. However, the recovered secret image is larger than the original secret image [5]. In 2002, Nakajima and Yamaguchi proposed extended visual cryptography for natural images [16].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation