A New Scheme for Lossless Meaningful Visual Secret Sharing by using XOR Properties

سال انتشار: 1402
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 75

فایل این مقاله در 18 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_JADM-11-2_003

تاریخ نمایه سازی: 27 تیر 1402

چکیده مقاله:

In this paper, a novel scheme for lossless meaningful visual secret sharing using XOR properties is presented. In the first step, genetic algorithm with an appropriate proposed objective function created noisy share images. These images do not contain any information about the input secret image and the secret image is fully recovered by stacking them together. Because of attacks on image transmission, a new approach for construction of meaningful shares by the properties of XOR is proposed. In recovery scheme, the input secret image is fully recovered by an efficient XOR operation. The proposed method is evaluated using PSNR, MSE and BCR criteria. The experimental results presents good outcome compared with other methods in both quality of share images and recovered image.

نویسندگان

A.M. Latif

Department of Computer Eengineering, Yazd University, Yazd, Iran.

Z. Mehrnahad

Department of Computer Eengineering, Yazd University, Yazd, Iran.

J. Zarepour

Department of Computer Science, Yazd University, Yazd, Iran.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • H. Khodadadi and A. Zandvakili, “A New Method for Encryption ...
  • R. Sangeetha, G. Koteeswari, and M. Phil, “Securing Data in ...
  • A. Shamir, “How to share a secret,” Communications of the ...
  • J.C. Ku-Cauich and G. Morales-Luna, “A linear code based on ...
  • C.C Thien and J.C Lin., “Secret image sharing,” Computer and ...
  • R.Z. Wang and C.H Su, “Secret image sharing with smaller ...
  • X. Jia, Y. Guo, X. Luo, D. Wang, and C. ...
  • S. Charoghchi and S. Mashhadi, “Three (t, n)-secret image sharing ...
  • C.C Yang, T.Y Chang, M.S Hwang. A (t, n) multi-secret ...
  • M. Naor and A. Shamir, “Visual cryptography,” Workshop on the ...
  • P. Singh, B. Raman, and M. Misra, “A (n, n) ...
  • M. Gupta and D. Chauhan, “A visual cryptographic scheme to ...
  • C. Blundo and A. De Santis, “Visual cryptography schemes with ...
  • P.L. Chiu and K.H Lee, “A simulated annealing algorithm for ...
  • O. Kafri and E. Keren, “Encryption of pictures and shapes ...
  • T.H Chen and K.H Tsao, “Visual secret sharing by random ...
  • X. Yan, X. Liu, and C.N Yang, “An enhanced threshold ...
  • H.C Chao and T.Y Fan, “XOR-based progressive visual secret sharing ...
  • S.J Shyu, “Image Encryption by Random Grids,” Pattern Recognition, Vol. ...
  • R.G. Sharma, P. Dimri, and H. Garg, “Visual cryptographic techniques ...
  • C.C. Chang, Y.H. Chen, and H.C. Wang, “Meaningful secret sharing ...
  • P.L Chiu and K.H Lee. “Efficient constructions for progressive visual ...
  • D. Wang, L. Zhang, N. Ma, and X. Li, “Two ...
  • D. Ou, W. Sun, and X. Wu, “Non-expansible XOR-based visual ...
  • J. Mohan and R. Rajesh, “Secure visual cryptography scheme with ...
  • Z. Wang, R.G. Arce, and G. Di Crescenzo. “Halftone visual ...
  • M.E. Hodeish and V.T. Humbe, “An optimized halftone visual cryptography ...
  • S. Wang, Y. Lu, X. Yan, L. Li, and Y. ...
  • Y. Zhao and F.W. Fu, “A cheating immune (k, n) ...
  • P.A. Eisen and D.R. Stinson, “Threshold visual cryptography schemes with ...
  • G. Ateniese, C. Blundo, A. De Santis, and D.R. Stinson, ...
  • S. Kukreja, G. Kasana, and S.S Kasana. “Cellular automata based ...
  • L. Chandana Priya, K, “Praveen. (t, k, n). Deterministic extended ...
  • S. Shivani, “Multi-secret sharing with unexpanded meaningful shares,” Multimedia Tools ...
  • S.P Kannojia and J. Kumar, “XOR-based visual secret sharing scheme ...
  • L. Liu, Y. Lu, and X. Yan. “A novel (k۱, ...
  • C.N. Yang and D.S. Wang, “Property analysis of XOR-based visual ...
  • A. Nag, J.P. Singh, and A.K Singh, “An efficient Boolean ...
  • K. Bhat, U.K. Reddy KR, R. Kumar HS, and D. ...
  • S.S Lee, J.C. Na, S.W. Sohn, C. Park, D.H. Seo, ...
  • S. Kumar and R.K. Sharma, “Threshold visual secret sharing based ...
  • T.Y. Fan and H.C. Chao, “User-friendly XOR-based visual secret sharing ...
  • D. Taghaddos and A. Latif, “Visual cryptography for gray-scale images ...
  • P.D. Shah and R.S Bichkar, “Secret data modification based image ...
  • نمایش کامل مراجع