2008 IEEE International Conference on Intelligence and Security Informatics 2008
DOI: 10.1109/isi.2008.4565080
|View full text |Cite
|
Sign up to set email alerts
|

Visual Cryptography (VC) with non-expanded shadow images: Hilbert-curve approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…In [11], Sura has proposed to split the secret image into four equally blocks, each block is rotated 90 degrees in the direction of rotation and then, numerous chaotic maps are used for confusion and diffusion with each block. The authors in [20] have shuffled the image with Zaslavskii and Hilbert Space Filling Curve algorithms [7], which consists of the confusion process. An encryption approach using the principle of the Josephus for confusion and the filtering technology for diffusion is given in [8].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [11], Sura has proposed to split the secret image into four equally blocks, each block is rotated 90 degrees in the direction of rotation and then, numerous chaotic maps are used for confusion and diffusion with each block. The authors in [20] have shuffled the image with Zaslavskii and Hilbert Space Filling Curve algorithms [7], which consists of the confusion process. An encryption approach using the principle of the Josephus for confusion and the filtering technology for diffusion is given in [8].…”
Section: Related Workmentioning
confidence: 99%
“…However, these traditional encryption methods remain limited in front of the current image encryption requirements [6]. In addition, some authors have proposed to realize confusion and diffusion approaches based on other techniques such as Zaslavskii and Hilbert Space Filling Curve algorithms [7] or the principle of the Josephus and the filtering technology [8]. With the introduction of chaos theory in cryptography, the chaotic encryption systems become the best solution to enhance security level of image information.…”
mentioning
confidence: 99%