Visual Authentication and Identification
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Sharing multiple secrets in digital images
Journal of Systems and Software
Sharing multiple secrets in visual cryptography
Pattern Recognition
A visual cryptography based system for sharing multiple secret images
ISCGAV'07 Proceedings of the 7th WSEAS International Conference on Signal Processing, Computational Geometry & Artificial Vision
Visual secret sharing by random grids revisited
Pattern Recognition
Multi-level visual secret sharing scheme with smooth-looking
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Efficient multi-secret image sharing based on Boolean operations
Signal Processing
A novel visual secret sharing scheme for multiple secrets without pixel expansion
Expert Systems with Applications: An International Journal
Journal of Visual Communication and Image Representation
A comprehensive study of visual cryptography
Transactions on data hiding and multimedia security V
Secure masks for visual cryptography
Transactions on data hiding and multimedia security V
Plane transform visual cryptography
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Visual multiple secret sharing based upon turning and flipping
Information Sciences: an International Journal
Threshold visual secret sharing by random grids
Journal of Systems and Software
Visual Multiple-Secret Sharing by Circle Random Grids
SIAM Journal on Imaging Sciences
Multi-image encryption by circular random grids
Information Sciences: an International Journal
Yet another multiple-image encryption by rotating random grids
Signal Processing
On the security of multi-secret visual cryptography scheme with ring shares
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.00 |
Traditional visual cryptography technique has provided sufficient security to fulfill the purpose of protecting confidential messages. In current technology, the same set of shares can be embedded with many sets of secret messages after one of the shares is rotated at different degrees. However, the used share is rectangle so that only four kinds of angle variation exist when stacking shares. Thus, when intending to embed many sets of confidential messages by using these shares, the angle variation of rotating the shares is limited. This paper proposes an improved (2, 2)-visual secret sharing scheme that adapts circular shares to deal with the limitation of rotating angles in traditional visual cryptography. The primary property of the proposed technique is that two sets of confidential messages can be embedded in the same shares. After rotating one of the shares to a certain degree and stacking it with another share, the content of the second confidential message can be obtained. The share used in this technique is circular, where confidential data can be embedded in various different angle conditions. Compared with traditional visual cryptography, this technique has more flexibility, extensibility and security.