Visual cryptography for general access structures
Information and Computation
Constructions and Properties of k out of nVisual Secret Sharing Schemes
Designs, Codes and Cryptography
New Colored Visual Secret Sharing Schemes
Designs, Codes and Cryptography
Communications of the ACM
Visual cryptography for grey level images
Information Processing Letters
Visual Cryptography II: Improving the Contrast Via the Cover Base
Proceedings of the International Workshop on Security Protocols
A Generalized Secret Image Sharing and Recovery Scheme
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Detection and restoration of tampered JPEG compressed images
Journal of Systems and Software
Sharing multiple secrets in digital images
Journal of Systems and Software
Hiding digital watermarks using fractal compression technique
Fundamenta Informaticae
Ideal contrast visual cryptography schemes with reversing
Information Processing Letters
A new multi-secret images sharing scheme using Largrange's interpolation
Journal of Systems and Software
Optimal colored threshold visual cryptography schemes
Designs, Codes and Cryptography
A new repeating color watermarking scheme based on human visual model
EURASIP Journal on Applied Signal Processing
Multi-level visual secret sharing scheme with smooth-looking
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Image hiding based on circular geometric moiré
MATH'09 Proceedings of the 14th WSEAS International Conference on Applied mathematics
A novel visual secret sharing scheme for multiple secrets without pixel expansion
Expert Systems with Applications: An International Journal
Image hiding based on circular moiré fringes
WSEAS Transactions on Mathematics
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability
Image and Vision Computing
A comprehensive study of visual cryptography
Transactions on data hiding and multimedia security V
An ideal multi-secret sharing scheme based on MSP
Information Sciences: an International Journal
Secret image sharing with authentication-chaining and dynamic embedding
Journal of Systems and Software
Visual multiple secret sharing based upon turning and flipping
Information Sciences: an International Journal
Improvements of a two-in-one image secret sharing scheme based on gray mixing model
Journal of Visual Communication and Image Representation
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
Journal of Systems and Software
A multi-threshold secret image sharing scheme based on MSP
Pattern Recognition Letters
Image hatching for visual cryptography
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) - Special Issue on Multimedia Security
Lossless secret image sharing based on generalized: LSB replacement
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Natural language letter based visual cryptography scheme
Journal of Visual Communication and Image Representation
Region-in-Region incrementing visual cryptography scheme
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
On the security of multi-secret visual cryptography scheme with ring shares
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Aspect ratio invariant visual cryptography by image filtering and resizing
Personal and Ubiquitous Computing
Sharing more information in gray visual cryptography scheme
Journal of Visual Communication and Image Representation
Hi-index | 0.01 |
Conventional visual secret sharing schemes are designed for a single secret image so it is inefficient to generate numerous share images for multiple secret images simultaneously. Therefore, a novel visual secret sharing scheme for multiple secret images is proposed in this paper. In the proposed encryption process, a stacking relationship graph of secret pixels and share blocks is generated to indicate the encryption functions, and a set of visual patterns is defined to produce two share images according to this graph. Based on the stacking properties of these patterns, the secret images can be obtained from the two share images at aliquot stacking angles. The proposed scheme makes the number of secret images not restricted and further extends it to be general. As a result, the proposed scheme enhances visual secret sharing schemes' ability for multiple secrets.