Application of homomorphism to secure image sharing

N Islam, W Puech, K Hayat, R Brouzet - Optics Communications, 2011 - Elsevier
In this paper, we present a new approach for sharing images between l players by exploiting
the additive and multiplicative homomorphic properties of two well-known public key …

A Novel General (n, n)-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain

F Xing, X Yan, L Yu, L Li - Entropy, 2022 - mdpi.com
(k, n)-threshold secret image sharing (SIS) protects an image by dividing it into n shadow
images. The secret image will be recovered as we gather k or more shadow images. In …

Visual multiple-secret sharing for flexible general access structure by random grids

KH Tsao, SJ Shyu, CH Lin, YS Lee, TH Chen - Displays, 2015 - Elsevier
For visual secret sharing (VSS), general access structure (GAS), which can freely define the
qualified set and the forbidden set, provides dealers the ability to share secret information …

ESSVCS: an enriched secret sharing visual cryptography

F Liu, WQ Yan, P Li, C Wu - Transactions on Data Hiding and Multimedia …, 2014 - Springer
Visual Cryptography (VC) is a powerful technique that combines the notions of perfect
ciphers and secret sharing in cryptography with that of raster graphics. A binary image can …

A cheat-prevention visual secret sharing scheme with efficient pixel expansion

S Liu, M Fujiyoshi, H Kiya - IEICE Transactions on Fundamentals of …, 2013 - search.ieice.org
This paper proposes a visual secret sharing (VSS) scheme with efficient pixel expansion
which prevents malicious share holders from deceiving an honest share holder. A VSS …

A cheat-prevention visual secret sharing scheme with minimum pixel expansion

S Liu, M Fujiyoshi, H Kiya - … IWDW 2013, Auckland, New Zealand, October …, 2014 - Springer
A visual secret sharing (VSS) scheme with minimum pixel expansion is proposed to prevent
malicious participants from deceiving an honest participant. A VSS scheme encrypts a secret …

A secret enriched visual cryptography

F Liu, WQ Yan, P Li, C Wu - … on Digital Forensics and Watermarking 2012 …, 2013 - Springer
Visual Cryptography (VC) is a powerful technique that combines the notions of perfect
ciphers and secret sharing in cryptography with that of raster graphics. A binary image can …

Improvement of the Quality of Visual Secret Sharing Schemes with Constraints on the Usage of Shares

M Fujii, T Shibuya - IEICE TRANSACTIONS on Information and …, 2020 - search.ieice.org
(k, n)-visual secret sharing scheme ((k, n)-VSSS) is a method to divide a secret image into n
images called shares that enable us to restore the original image by only stacking at least k …

[PDF][PDF] A Study on Visually Encrypted Images for Rights Protection and Authentication

リュウセンチュアン, 劉審川 - 2014 - tokyo-metro-u.repo.nii.ac.jp
In this chapter, Visually encrypted images are introduced. For visually encrypted images, the
format of input files is image and the format of output files is also image. It is difficult to …

Encrypting More Information in Visual Cryptography Scheme

F Liu, P Li, CK Wu - Cryptology ePrint Archive, 2011 - eprint.iacr.org
The visual cryptography scheme (VCS) is a scheme which encodes a secret image into
several shares, and only qualified sets of shares can recover the secret image visually, other …