Have a personal or library account? Click to login
Significant Secret Image Sharing Scheme Based on Boolean Operation Cover

Significant Secret Image Sharing Scheme Based on Boolean Operation

By: Monu Verma and  Rajneesh Rani  
Open Access
|Jun 2017

References

  1. 1. Blakely, G. R. Safeguarding Cryptographic Keys. – Proc. AFIPS, Vol. 48, 1979, pp. 313-317.10.1109/MARK.1979.8817296
  2. 2. Shamir, A. How to Share a Secret. – Communications of the ACM, Vol. 22, 1979, No 11, pp. 612-613.10.1145/359168.359176
  3. 3. Thien, C. C., J. C. Lin. Secret Image Sharing. – Computers & Graphics, Vol. 26, 2002, No 5, pp. 765-770.10.1016/S0097-8493(02)00131-0
  4. 4. Lin, C. C., W. H. Tsai. Secret Image Sharing with Steganography and Authentication. – Journal of Systems and Software, Vol. 73, 2004, No 3, pp. 405-414.10.1016/S0164-1212(03)00239-5
  5. 5. Wang, R. Z., C. H. Su. Secret Image Sharing with Smaller Shadow Images. – Pattern Recognition Letters, Vol. 27, 2006, No 6, pp. 551-555.10.1016/j.patrec.2005.09.021
  6. 6. Chang, C. C., C. C. Lin, C. H. Lin, Y. H. Chen. A Novel Secret Image Sharing Scheme in Color Images Using Small Shadow Images. – Information Sciences, Vol. 178, 2008, No 11, pp. 2433-2447.10.1016/j.ins.2007.12.016
  7. 7. Tsai, D. S., G. Horng, T. H. Chen, Y. T. Huang. A Novel Secret Image Sharing Scheme for True-Color Images with Size Constraint. – Information Sciences, Vol. 179, 2009, No 19, pp. 3247-3254.10.1016/j.ins.2009.05.020
  8. 8. Naor, M., A. Shamir. Visual Cryptography. – In: Advances in Cryptography Eurocrypt’94. Lecture Notes in Computer Science. Vol. 950. Springer-Verlag, 1995, pp. 1-12.10.1007/BFb0053419
  9. 9. Ateniese, G., C. Blundo, A. De Santis, D. R. Stinson. Extended Capabilities for Visual Cryptography. – Theoretical Computer Science, Vol. 250, 2001, No 1, pp. 143-161.10.1016/S0304-3975(99)00127-9
  10. 10. Tsai, D. S., T. H. Chen, G. Horng. A Cheating Prevention Scheme for Binary Visual Cryptography with Homogeneous Secret Images. – Pattern Recognition, Vol. 40, 2007, No 8, pp. 2356-2366.10.1016/j.patcog.2007.01.013
  11. 11. Lin, C. C., W. H. Tsai. Visual Cryptography for Gray-Level Images by Dithering Techniques. – Pattern Recognition Letters, Vol. 24, 2003, No 1, pp. 349-358.10.1016/S0167-8655(02)00259-3
  12. 12. Blundo, C., A. De Santis, M. Naor. Visual Cryptography for Grey Level Images. – Information Processing Letters, Vol. 75, 2000, No 6, pp. 255-259.10.1016/S0020-0190(00)00108-3
  13. 13. Hou, Y. C. Visual Cryptography for Color Images. – Pattern Recognition, Vol. 36, 2003, No 7, pp. 1619-1629.10.1016/S0031-3203(02)00258-3
  14. 14. Wang, D., L. Zhang, N. Ma, X. Li. Two Secret Sharing Schemes Based on Boolean Operations. – Pattern Recognition, Vol. 40, 2007, No 10, pp. 2776-2785.10.1016/j.patcog.2006.11.018
  15. 15. Chen, C. C., C. C. Chen, Y. C. Lin. Weighted Modulated Secret Image Sharing Method. – Journal of Electronic Imaging, Vol. 18, 2009, No 4, pp. 043011-043011.10.1117/1.3268362
  16. 16. Li, P., C. N. Yang, C. C. Wu, Q. Kong, Y. Ma. Essential Secret Image Sharing Scheme with Different Importance of Shadows. – Journal of Visual Communication and Image Representation, Vol. 24, 2013, No 7, pp.1106-1114.10.1016/j.jvcir.2013.07.005
  17. 17. Nag, A., S. Biswas, D. Sarkar, P. P. Sarka. Secret Image Sharing Scheme Based on a Boolean Operation. – Cybernetics and Information Technologies, Vol. 14, 2014, No 2, pp. 98-113.10.2478/cait-2014-0023
  18. 18. Chang, C. C., C. C. Lin, T. H. N. Le, H. B. Le. Sharing a Verifiable Secret Image Using Two Shadows. – Pattern Recognition, Vol. 42, 2009, No 11, pp. 3097-3114.10.1016/j.patcog.2009.04.012
  19. 19. Liu, H., X. Wang. Image Encryption Using DNA Complementary Rule and Chaotic Maps. – Applied Soft Computing, Vol. 12, 2012, No 5, pp. 1457-1466.10.1016/j.asoc.2012.01.016
  20. 20. Zhu, C. A Novel Image Encryption Scheme Based on Improved Hyperchaotic Sequences. – Optics Communications, Vol. 285, 2012, No 1, pp. 29-37.10.1016/j.optcom.2011.08.079
  21. 21. Chen, T. H., C. S. Wu. Efficient Multi-Secret Image Sharing Based on Boolean Operations. – Signal Processing, Vol. 91, 2011, No 1, pp. 90-97.10.1016/j.sigpro.2010.06.012
  22. 22. Verma, M., R. Rani. Strong Thershold Secret Image Sharing Based on Boolean Operation. – In: Proc. of International Conference on Computing, Communication and Automation (ICCCA’16), IEEE, 2016, pp. 1145-1149.10.1109/CCAA.2016.7813889
  23. 23. Thomos, N., N. V. Boulgouris, M. G. Strintzis. Optimized Transmission of JPEG2000 Streams over Wireless Channels. – IEEE Transactions on Image Processing, Vol. 15, 2006, No 1.10.1109/TIP.2005.860338
  24. 24. Xiangjun, L., C. Jianfei. Robust Transmission of JPEG2000 Encoded Images over Packet Loss Channels. – ICME, School of Computer Engineering, Nanyang Technological University, 2007, pp. 947-950.
DOI: https://doi.org/10.1515/cait-2017-0022 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 134 - 150
Published on: Jun 26, 2017
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2017 Monu Verma, Rajneesh Rani, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.