A Computational Approach to Edge Detection
IEEE Transactions on Pattern Analysis and Machine Intelligence
Adaptive filter theory
Communications of the ACM
Visual cryptography for grey level images
Information Processing Letters
A color halftoning algorithm for low-bit flat panel displays
ICIP '95 Proceedings of the 1995 International Conference on Image Processing (Vol.2)-Volume 2 - Volume 2
New visual secret sharing schemes using probabilistic method
Pattern Recognition Letters
Cheating in Visual Cryptography
Designs, Codes and Cryptography
Probabilistic Visual Cryptography Schemes
The Computer Journal
Efficient visual secret sharing scheme for color images
Pattern Recognition
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
Two secret sharing schemes based on Boolean operations
Pattern Recognition
A multiple-level visual secret-sharing scheme without image size expansion
Information Sciences: an International Journal
Sharing secrets in stego images with authentication
Pattern Recognition
A New Probabilistic Visual Secret Sharing Scheme for Color Images
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
A new image secret sharing scheme to identify cheaters
Computer Standards & Interfaces
Cheating immune (2, n)-threshold visual secret sharing
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Optimized halftoning using dot diffusion and methods for inverse halftoning
IEEE Transactions on Image Processing
Look-up table (LUT) method for inverse halftoning
IEEE Transactions on Image Processing
Inverse halftoning algorithm using edge-based lookup table approach
IEEE Transactions on Image Processing
A verifiable secret sharing scheme based on AMBTC
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
A hierarchical threshold secret image sharing
Pattern Recognition Letters
A (2, 2) secret sharing scheme based on hamming code and AMBTC
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part II
A secret sharing scheme for EBTC using steganography
Journal of Intelligent Manufacturing
Hi-index | 0.01 |
In this paper, we propose a novel (2,2) verifiable secret sharing (VSS) scheme, which not only protects a secret image but also allows users to verify the restored secret image in the revealing and verifying phase, for all binary, grayscale and color images. Error diffusion and image clustering techniques are adopted to achieve our objective. Experimental results and discussions show that the proposed scheme, with its smaller shadow size and lower computational complexity, obviously outperforms previous VSS schemes designed either with or without the cheating prevention mechanism. Moreover, the use of a halftone logo gives an efficient solution to verifying whether the restored secret image is correct by using a halftone logo.