Visual cryptography for general access structures
Information and Computation
Color image processing and applications
Color image processing and applications
New Colored Visual Secret Sharing Schemes
Designs, Codes and Cryptography
Contrast-optimal k out of n secret sharing schemes in visual cryptography
Theoretical Computer Science - computing and combinatorics
Digital watermarking
Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels
Designs, Codes and Cryptography
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Lower bounds on the information rate of secret sharing schemes with homogeneous access structure
Information Processing Letters
Visual cryptography for gray-level images by dithering techniques
Pattern Recognition Letters
New visual secret sharing schemes using probabilistic method
Pattern Recognition Letters
A cost-effective private-key cryptosystem for color image encryption
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part I
Analytical estimation of signal transition activity from word-level statistics
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Image Communication
A multiple-level visual secret-sharing scheme without image size expansion
Information Sciences: an International Journal
On the security of a visual cryptography scheme for color images
Pattern Recognition
(r, n)-threshold image secret sharing methods with small shadow images
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Hi-index | 0.00 |
A new secret sharing scheme suitable for encrypting color images is introduced. The scheme, which can be viewed as a cost-effective, private-key cryptosystem, encrypts the secret color image into two color shares with dimensions identical to those of the original secret input. Cryptographic operations performed at the bit levels are used to alter both the spectral correlation among the RGB color components and the spatial correlation of the neighboring color vectors in the secret image. The original image is decrypted with perfect reconstruction using inverse logical operations which are applied to the noise-like color shares. The scheme can be used in secure transmission of digital imaging material over untrusted networks or it can serve as stand-alone image encryption solution.