Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (46)

Search Parameters:
Keywords = visual secret-sharing

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 6911 KB  
Article
A Meaningful (n, n)-Threshold Visual Secret Sharing Scheme Based on QR Codes and Information Hiding
by Tao Liu, Yongjie Wang, Xuehu Yan, Yanlin Huo and Canju Lu
Mathematics 2026, 14(3), 405; https://doi.org/10.3390/math14030405 - 23 Jan 2026
Viewed by 89
Abstract
Visual secret sharing (VSS) schemes can enhance the security of image transmission over networks. Conventional VSS schemes often generate meaningless shares, which can raise suspicion among potential attackers. To address this issue, this paper proposes a novel VSS scheme that integrates information hiding [...] Read more.
Visual secret sharing (VSS) schemes can enhance the security of image transmission over networks. Conventional VSS schemes often generate meaningless shares, which can raise suspicion among potential attackers. To address this issue, this paper proposes a novel VSS scheme that integrates information hiding techniques with quick response (QR) codes to generate meaningful shares. The first n1 shares are encoded as standard QR codes, while the n-th share is embedded into a grayscale carrier image using a reversible information hiding method, ensuring the carrier remains visually meaningful. During transmission, the n1 QR codes and the hidden image are distributed. At the receiver end, the hidden n-th share is extracted losslessly from the carrier image using the n1 QR codes, and the original secret image is perfectly reconstructed by bitwise XORing all n shares. Experimental results demonstrate the feasibility, security, and visual quality of the proposed scheme. Full article
17 pages, 1778 KB  
Article
An XOR-Based (k, n) Visual Fully Independent Secrets Sharing Scheme with Meaningful Shares
by Wen-Ting Lee and Justie Su-Tzu Juan
Appl. Sci. 2025, 15(23), 12720; https://doi.org/10.3390/app152312720 - 1 Dec 2025
Viewed by 309
Abstract
With the rapid advancement of technology, data transmission security has become an increasingly critical issue. Visual Cryptography Scheme (VCS) provides a secure method for sharing secret images without complex computation—by stacking multiple shares, the secret image can be visually recognized. The earliest visual [...] Read more.
With the rapid advancement of technology, data transmission security has become an increasingly critical issue. Visual Cryptography Scheme (VCS) provides a secure method for sharing secret images without complex computation—by stacking multiple shares, the secret image can be visually recognized. The earliest visual cryptography scheme was proposed. However, traditional VCS are limited to the encryption and decryption of a single secret. To address the evolving demands of modern information security, numerous enhanced VCS have been introduced by researchers, offering new perspectives and capabilities. This paper proposes a novel XOR-based visual cryptography scheme that supports fully independent secrets within a (k, n)-threshold framework for 2 ≤ k < n. In the proposed scheme, n shares can simultaneously encrypt C(n, k) distinct secrets. Each secret can be reconstructed by one subset of k shares out of the n, and all shares are designed to be meaningful images so as not to be identified as hiding a secret. This approach significantly enhances the flexibility of VCS, enabling its application in scenarios where different groups hold different secrets or where the reconstructed secret identifies the associated group, which can help administrators know which group has accessed the secret. As such, the proposed scheme is more suitable for a wide range of practical applications. Full article
(This article belongs to the Special Issue Recent Progress of Information Security and Cryptography)
Show Figures

Figure 1

28 pages, 12461 KB  
Article
HCSS-GB and IBESS: Secret Image Sharing Schemes with Enhanced Shadow Management and Visual-Gradient Access Control
by Huanrong Pan, Wei Yan, Rui Wang and Yongqiang Yu
Entropy 2025, 27(9), 893; https://doi.org/10.3390/e27090893 - 23 Aug 2025
Viewed by 913
Abstract
Image protection in privacy-sensitive domains, such as healthcare and military, exposes critical limitations in existing secret image sharing (SIS) schemes, including cumbersome shadow management, coarse-grained access control, and an inefficient storage-speed trade-off, which limits SIS in practical scenarios. Thus, this paper proposes two [...] Read more.
Image protection in privacy-sensitive domains, such as healthcare and military, exposes critical limitations in existing secret image sharing (SIS) schemes, including cumbersome shadow management, coarse-grained access control, and an inefficient storage-speed trade-off, which limits SIS in practical scenarios. Thus, this paper proposes two SIS schemes to address the above issues: the hierarchical control sharing scheme with Gaussian blur (HCSS-GB) and the image bit expansion-based sharing scheme (IBESS). For scenarios with limited storage space, HCSS-GB employs Gaussian blur to generate gradient-blurred cover images and integrates a controllable sharing model to produce meaningful shadow images without pixel expansion based on Shamir’s secret sharing. Furthermore, to accommodate real-time application scenarios, IBESS employs bit expansion to combine the high bits of generated shadow images with those of blurred carrier images, enhancing operational efficiency at the cost of increased storage overhead. Experimental results demonstrate that both schemes achieve lossless recovery (with PSNR of , MSE of 0, and SSIM of 1), validating their reliability. Specifically, HCSS-GB maintains a 1:1 storage ratio with the original image, making it highly suitable for storage-constrained environments; IBESS exhibits exceptional efficiency, with sharing time as low as 2.1 s under the (7,8) threshold, ideal for real-time tasks. Comparative analyses further show that using carrier images with high standard deviation contrast (Cσ) and Laplacian-based sharpness (SL) significantly enhances shadow distinguishability, strengthening the effectiveness of hierarchical access control. Both schemes provide valuable solutions for secure image sharing and efficient shadow management, with their validity and practicality confirmed by experimental data. Full article
(This article belongs to the Special Issue Information-Theoretic Security and Privacy)
Show Figures

Figure 1

23 pages, 4254 KB  
Article
A Strongly Robust Secret Image Sharing Algorithm Based on QR Codes
by Pengcheng Huang, Canyu Chen and Xinmeng Wan
Algorithms 2025, 18(9), 535; https://doi.org/10.3390/a18090535 - 22 Aug 2025
Viewed by 1180
Abstract
Secret image sharing (SIS) is an image protection technique based on cryptography. However, traditional SIS schemes have limited noise resistance, making it difficult to ensure reconstructed image quality. To address this issue, this paper proposes a robust SIS scheme based on QR codes, [...] Read more.
Secret image sharing (SIS) is an image protection technique based on cryptography. However, traditional SIS schemes have limited noise resistance, making it difficult to ensure reconstructed image quality. To address this issue, this paper proposes a robust SIS scheme based on QR codes, which enables the efficient and lossless reconstruction of the secret image without pixel expansion. Moreover, the proposed scheme maintains high reconstruction quality under noisy conditions. In the sharing phase, the scheme compresses the length of shares by optimizing polynomial computation and improving the pixel allocation strategy. Reed–Solomon coding is then incorporated to enhance the anti-noise capability during the sharing process, while achieving meaningful secret sharing using QR codes as carriers. In the reconstruction phase, the scheme further improves the quality of the reconstructed secret image by combining image inpainting algorithms with the error-correction capability of Reed–Solomon codes. The experimental results show that the scheme can achieve lossless reconstruction when the salt-and-pepper noise density is less than d0.02, and still maintains high-quality reconstruction when d0.13. Compared with the existing schemes, the proposed method significantly improves noise robustness without pixel expansion, while preserving the visual meaning of the QR code carrier, and achieves a secret sharing strategy that combines robustness and practicality. Full article
Show Figures

Figure 1

15 pages, 2679 KB  
Article
Gradual Improvements in the Visual Quality of the Thin Lines Within the Random Grid Visual Cryptography Scheme
by Maged Wafy
Electronics 2025, 14(16), 3212; https://doi.org/10.3390/electronics14163212 - 13 Aug 2025
Viewed by 456
Abstract
The visual cryptography scheme (VCS) is a fundamental image encryption technique that divides a secret image into two or more shares, such that the original image can be revealed by superimposing a sufficient number of shares. A major limitation of conventional VCS methods [...] Read more.
The visual cryptography scheme (VCS) is a fundamental image encryption technique that divides a secret image into two or more shares, such that the original image can be revealed by superimposing a sufficient number of shares. A major limitation of conventional VCS methods is pixel expansion, wherein the generated shares and reconstructed image are typically at least twice the size of the original. Additionally, thin lines or curves—only one pixel wide in the original image—often appear distorted or duplicated in the reconstructed version, a distortion known as the thin-line problem (TLP). To eliminate the reliance on predefined codebooks inherent in traditional VCS, Kafri introduced the Random Grid visual cryptography scheme (RG-VCS), which eliminates the need for such codebooks. This paper introduces novel algorithms that are among the first to explicitly address the thin-line problem in the context of random grid based schemes. This paper presents novel visual cryptography algorithms specifically designed to address the thin-line preservation problem (TLP), which existing methods typically overlook. A comprehensive visual and numerical comparison was conducted against existing algorithms that do not explicitly handle the TLP. The proposed methods introduce adaptive encoding strategies that preserve fine image details, fully resolving TLP-2 and TLP-3 and partially addressing TLP-1. Experimental results show an average improvement of 18% in SSIM and 13% in contrast over existing approaches. Statistical t-tests confirm the significance of these enhancements, demonstrating the effectiveness and superiority of the proposed algorithms. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

10 pages, 1726 KB  
Proceeding Paper
New (t, n)-Threshold P-VSS Schemes Using Fewer Types of Polarizers
by Cang-Wei Huang and Justie Su-Tzu Juan
Eng. Proc. 2025, 92(1), 49; https://doi.org/10.3390/engproc2025092049 - 6 May 2025
Cited by 2 | Viewed by 505
Abstract
As network demands increase, encryption becomes increasingly important. Visual secret sharing (VSS) encrypts a secret image into multiple images (called shares) and then superimposes these shares so that the original image can be directly identified by humans. In traditional VSS, black represents 1 [...] Read more.
As network demands increase, encryption becomes increasingly important. Visual secret sharing (VSS) encrypts a secret image into multiple images (called shares) and then superimposes these shares so that the original image can be directly identified by humans. In traditional VSS, black represents 1 and white represents 0. Therefore, traditional VSS decryption methods are viewed as logical OR operations. In 1997, the VSS scheme based on the polarization of the light wave was proposed. It utilizes the fact that light passes through a unidirectional polarizer but cannot pass through two mutually perpendicular polarizers. This scheme is relevant to a logical XOR operation in decryption. However, this scheme does not explain the situation when more than two shares are decrypted. Therefore, a new (t, n)-threshold VSS scheme based on polarization (called (t, n)-threshold P-VSS) was proposed to solve the above problem. In that (t, n)-threshold P-VSS scheme, four types of polarizers were used to design the scheme. In this study, we propose three (t, n)-threshold P-VSS schemes, each using only two or three types of polarizers to effectively reduce the proportion of black pixels in the shares compared with previous work. Experimental results and theoretical analysis prove the safety and effectiveness of these schemes. Full article
(This article belongs to the Proceedings of 2024 IEEE 6th Eurasia Conference on IoT, Communication and Engineering)
Show Figures

Figure 1

29 pages, 16039 KB  
Article
PRIVocular: Enhancing User Privacy Through Air-Gapped Communication Channels
by Anastasios N. Bikos
Cryptography 2025, 9(2), 29; https://doi.org/10.3390/cryptography9020029 - 1 May 2025
Viewed by 2349
Abstract
Virtual reality (VR)/the metaverse is transforming into a ubiquitous technology by leveraging smart devices to provide highly immersive experiences at an affordable price. Cryptographically securing such augmented reality schemes is of paramount importance. Securely transferring the same secret key, i.e., obfuscated, between several [...] Read more.
Virtual reality (VR)/the metaverse is transforming into a ubiquitous technology by leveraging smart devices to provide highly immersive experiences at an affordable price. Cryptographically securing such augmented reality schemes is of paramount importance. Securely transferring the same secret key, i.e., obfuscated, between several parties is the main issue with symmetric cryptography, the workhorse of modern cryptography, because of its ease of use and quick speed. Typically, asymmetric cryptography establishes a shared secret between parties, after which the switch to symmetric encryption can be made. However, several SoTA (State-of-The-Art) security research schemes lack flexibility and scalability for industrial Internet-of-Things (IoT)-sized applications. In this paper, we present the full architecture of the PRIVocular framework. PRIVocular (i.e., PRIV(acy)-ocular) is a VR-ready hardware–software integrated system that is capable of visually transmitting user data over three versatile modes of encapsulation, encrypted—without loss of generality—using an asymmetric-key cryptosystem. These operation modes can be optical character-based or QR-tag-based. Encryption and decryption primarily depend on each mode’s success ratio of correct encoding and decoding. We investigate the most efficient means of ocular (encrypted) data transfer by considering several designs and contributing to each framework component. Our pre-prototyped framework can provide such privacy preservation (namely virtual proof of privacy (VPP)) and visually secure data transfer promptly (<1000 ms), as well as the physical distance of the smart glasses (∼50 cm). Full article
Show Figures

Figure 1

11 pages, 8074 KB  
Proceeding Paper
The (n, n) Visual Multi-Secrets Sharing Scheme with Abilities of OR and XOR Decryption
by An-Hui Lo and Justie Su-Tzu Juan
Eng. Proc. 2025, 89(1), 41; https://doi.org/10.3390/engproc2025089041 - 25 Mar 2025
Cited by 3 | Viewed by 533
Abstract
Naor and Shamir introduced the fundamental concept of visual cryptography (VC) in 1994. In that model, the secret image is split into two meaningless shares, allowing the secret to be revealed and recognized by the human eye just by superimposing the two shares. [...] Read more.
Naor and Shamir introduced the fundamental concept of visual cryptography (VC) in 1994. In that model, the secret image is split into two meaningless shares, allowing the secret to be revealed and recognized by the human eye just by superimposing the two shares. Since then, many scholars have studied the VC problem. To improve the efficiency of transmitting secrets, multi-secret visual cryptography has been proposed to encrypt multiple secret images at the same time. On the other hand, with the reduction in hardware costs, research on XOR-based VC has become popular to address the issue of poor image quality in the recovered image of OR-based visual cryptography, though it requires computing equipment. Scholars also have developed VC schemes utilizing OR-based decryption (equivalent to traditional VC) and XOR-based decryption. These schemes recover secrets without additional hardware (using OR-based decryption) and provide higher-quality images when extra hardware is available (using XOR-based decryption). We propose a visual multi-secret sharing scheme (VMSSS) to encrypt multiple secret images into n (>1) shares. When all shares are collected, all original secret images are decrypted by using the OR or XOR operation. Full article
Show Figures

Figure 1

22 pages, 28158 KB  
Article
Edge-Aware Dual-Task Image Watermarking Against Social Network Noise
by Hao Jiang, Jiahao Wang, Yuhan Yao, Xingchen Li, Feifei Kou, Xinkun Tang and Limei Qi
Appl. Sci. 2025, 15(1), 57; https://doi.org/10.3390/app15010057 - 25 Dec 2024
Viewed by 2000
Abstract
In the era of widespread digital image sharing on social media platforms, deep-learning-based watermarking has shown great potential in copyright protection. To address the fundamental trade-off between the visual quality of the watermarked image and the robustness of watermark extraction, we explore the [...] Read more.
In the era of widespread digital image sharing on social media platforms, deep-learning-based watermarking has shown great potential in copyright protection. To address the fundamental trade-off between the visual quality of the watermarked image and the robustness of watermark extraction, we explore the role of structural features and propose a novel edge-aware watermarking framework. Our primary innovation lies in the edge-aware secret hiding module (EASHM), which achieves adaptive watermark embedding by aligning watermarks with image structural features. To realize this, the EASHM leverages knowledge distillation from an edge detection teacher and employs a dual-task encoder that simultaneously performs edge detection and watermark embedding through maximal parameter sharing. The framework is further equipped with a social network noise simulator (SNNS) and a secret recovery module (SRM) to enhance robustness against common image noise attacks. Extensive experiments on three public datasets demonstrate that our framework achieves superior watermark imperceptibility, with PSNR and SSIM values exceeding 40.82 dB and 0.9867, respectively, while maintaining an over 99% decoding accuracy under various noise attacks, outperforming existing methods by significant margins. Full article
(This article belongs to the Topic Intelligent Image Processing Technology)
Show Figures

Figure 1

18 pages, 2724 KB  
Article
MRA-VSS: A Matrix-Based Reversible and Authenticable Visual Secret-Sharing Scheme Using Dual Meaningful Images
by Chia-Chen Lin, En-Ting Chu, Ya-Fen Chang and Ersin Elbasi
Mathematics 2024, 12(22), 3532; https://doi.org/10.3390/math12223532 - 12 Nov 2024
Viewed by 1031
Abstract
Reversible data hiding (RDH) is an approach that emphasizes the imperceptibility of hidden confidential data and the restoration of the original cover image. To achieve these objectives at the same time, in this paper, we design a matrix-based crossover data hiding strategy and [...] Read more.
Reversible data hiding (RDH) is an approach that emphasizes the imperceptibility of hidden confidential data and the restoration of the original cover image. To achieve these objectives at the same time, in this paper, we design a matrix-based crossover data hiding strategy and then propose a novel matrix-based RDH scheme with dual meaningful image shadows, called MRA-VSS (matrix-based reversible and authenticable visual secret-sharing). Each pixel in a secret image is divided into two parts, and each part is embedded into a cover pixel pair by referring to the intersection point of four overlapping frames. During the share construction phase, not only partial information of the pixel in a secret image but also authentication codes are embedded into the corresponding cover pixel pair. Finally, two meaningful image shadows are derived. The experimental results confirm that our designed MRA-VSS successfully embeds pixels’ partial information and authentication code into cover pixel pairs at the cost of slight distortion during data hiding. Nevertheless, the robustness of our scheme under the steganalysis attack and the authentication capability of our scheme are also proven. Full article
(This article belongs to the Section E2: Control Theory and Mechanics)
Show Figures

Figure 1

22 pages, 7227 KB  
Article
Robust Reversible Watermarking Scheme in Video Compression Domain Based on Multi-Layer Embedding
by Yifei Meng, Ke Niu, Yingnan Zhang, Yucheng Liang and Fangmeng Hu
Electronics 2024, 13(18), 3734; https://doi.org/10.3390/electronics13183734 - 20 Sep 2024
Cited by 2 | Viewed by 2310
Abstract
Most of the existing research on video watermarking schemes focus on improving the robustness of watermarking. However, in application scenarios such as judicial forensics and telemedicine, the distortion caused by watermark embedding on the original video is unacceptable. To solve this problem, this [...] Read more.
Most of the existing research on video watermarking schemes focus on improving the robustness of watermarking. However, in application scenarios such as judicial forensics and telemedicine, the distortion caused by watermark embedding on the original video is unacceptable. To solve this problem, this paper proposes a robust reversible watermarking (RRW)scheme based on multi-layer embedding in the video compression domain. Firstly, the watermarking data are divided into several sub-secrets by using Shamir’s (t, n)-threshold secret sharing. After that, the chroma sub-block with more complex texture information is filtered out in the I-frame of each group of pictures (GOP), and the sub-secret is embedded in that frame by modifying the discrete cosine transform (DCT) coefficients within the sub-block. Finally, the auxiliary information required to recover the coefficients is embedded into the motion vector of the P-frame of each GOP by a reversible steganography algorithm. In the absence of an attack, the receiver can recover the DCT coefficients by extracting the auxiliary information in the vectors, ultimately recovering the video correctly. The watermarking scheme demonstrates strong robustness even when it suffers from malicious attacks such as recompression attacks and requantization attacks. The experimental results demonstrate that the watermarking scheme proposed in this paper exhibits reversibility and high visual quality. Moreover, the scheme surpasses other comparable methods in the robustness test session. Full article
(This article belongs to the Special Issue Advances in Algorithm Optimization and Computational Intelligence)
Show Figures

Figure 1

16 pages, 1968 KB  
Article
DNA-Binding Proteins and Passenger Proteins in Plasma DNA–Protein Complexes: Imprint of Parental Cells or Key Mediators of Carcinogenesis Processes?
by Oleg Tutanov, Aleksei Shefer, Evgenii Shefer, Pavel Ruzankin, Yuri Tsentalovich and Svetlana Tamkovich
Int. J. Mol. Sci. 2024, 25(10), 5165; https://doi.org/10.3390/ijms25105165 - 9 May 2024
Cited by 1 | Viewed by 2520
Abstract
Knowledge of the composition of proteins that interact with plasma DNA will provide a better understanding of the homeostasis of circulating nucleic acids and the various modes of interaction with target cells, which may be useful in the development of gene targeted therapy [...] Read more.
Knowledge of the composition of proteins that interact with plasma DNA will provide a better understanding of the homeostasis of circulating nucleic acids and the various modes of interaction with target cells, which may be useful in the development of gene targeted therapy approaches. The goal of the present study is to shed light on the composition and architecture of histone-containing nucleoprotein complexes (NPCs) from the blood plasma of healthy females (HFs) and breast cancer patients (BCPs) and to explore the relationship of proteins with crucial steps of tumor progression: epithelial–mesenchymal transition (EMT), cell proliferation, invasion, cell migration, stimulation of angiogenesis, and immune response. MALDI-TOF mass spectrometric analysis of NPCs isolated from blood samples using affine chromatography was performed. Bioinformatics analysis showed that the shares of DNA-binding proteins in the compositions of NPCs in normal and cancer patients are comparable and amount to 40% and 33%, respectively; in total, we identified 38 types of DNA-binding motifs. Functional enrichment analysis using FunRich 3.13 showed that, in BCP blood, the share of DNA-binding proteins involved in nucleic acid metabolism increased, while the proportion of proteins involved in intercellular communication and signal transduction decreased. The representation of NPC passenger proteins in breast cancer also changes: the proportion of proteins involved in transport increases and the share of proteins involved in energy biological pathways decreases. Moreover, in the HF blood, proteins involved in the processes of apoptosis were more represented in the composition of NPCs and in the BCP blood—in the processes of active secretion. For the first time, bioinformatics approaches were used to visualize the architecture of circulating NPCs in the blood and to show that breast cancer has an increased representation of passenger proteins involved in EMT, cell proliferation, invasion, cell migration, and immune response. Using breast cancer protein data from the Human Protein Atlas (HPA) and DEPC, we found that 86% of NPC proteins in the blood of BCPs were not previously annotated in these databases. The obtained data may indirectly indicate directed protein sorting in NPCs, which, along with extracellular vesicles, can not only be diagnostically significant molecules for liquid biopsy, but can also carry out the directed transfer of genetic material from donor cells to recipient cells. Full article
(This article belongs to the Special Issue Recent Analysis and Applications of Mass Spectrum in Biochemistry 2.0)
Show Figures

Figure 1

19 pages, 1358 KB  
Article
Advanced Dual Reversible Data Hiding: A Focus on Modification Direction and Enhanced Least Significant Bit (LSB) Approaches
by Cheonshik Kim, Luis Cavazos Quero, Ki-Hyun Jung and Lu Leng
Appl. Sci. 2024, 14(6), 2437; https://doi.org/10.3390/app14062437 - 14 Mar 2024
Cited by 11 | Viewed by 1992
Abstract
In this study, we investigate advances in reversible data hiding (RDH), a critical area in the era of widespread digital data sharing. Recognizing the inherent vulnerabilities such as unauthorized access and data corruption during data transmission, we introduce an innovative dual approach to [...] Read more.
In this study, we investigate advances in reversible data hiding (RDH), a critical area in the era of widespread digital data sharing. Recognizing the inherent vulnerabilities such as unauthorized access and data corruption during data transmission, we introduce an innovative dual approach to RDH. We use the EMD (Exploiting Modification Direction) method along with an optimized LSB (Least Significant Bit) replacement strategy. This dual method, applied to grayscale images, has been carefully developed to improve data hiding by focusing on modifying pixel pairs. Our approach sets new standards for achieving a balance between high data embedding rates and the integrity of visual quality. The EMD method ensures that each secret digit in a 5-ary notational system is hidden by 2 cover pixels. Meanwhile, our LSB strategy finely adjusts the pixels selected by EMD to minimize data errors. Despite its simplicity, this approach has been proven to outperform existing technologies. It offers a high embedding rate (ER) while maintaining the high visual quality of the stego images. Moreover, it significantly improves data hiding capacity. This enables the full recovery of the original image without increasing file size or adding unnecessary data, marking a significant breakthrough in data security. Full article
(This article belongs to the Special Issue Deep Learning for Data Analysis)
Show Figures

Figure 1

11 pages, 4976 KB  
Article
Image Division Using Threshold Schemes with Privileges
by Marek R. Ogiela and Lidia Ogiela
Electronics 2024, 13(5), 931; https://doi.org/10.3390/electronics13050931 - 29 Feb 2024
Viewed by 1044
Abstract
Threshold schemes are used among cryptographic techniques for splitting visual data. Such methods allow the generation of a number of secret shares, a certain number of which need to be assembled in order to reconstruct the original image. Traditional techniques for partitioning secret [...] Read more.
Threshold schemes are used among cryptographic techniques for splitting visual data. Such methods allow the generation of a number of secret shares, a certain number of which need to be assembled in order to reconstruct the original image. Traditional techniques for partitioning secret information generate equal shares, i.e., each share has the same value when reconstructing the original secret. However, it turns out that it is possible to develop and use partitioning protocols that allow the generation of privileged shares, i.e., those that allow the reconstruction of secret data in even smaller numbers. This paper will therefore describe new information sharing protocols that create privileged shares, which will also use visual authorization codes based on subject knowledge to select privileged shares for secret restoration. For the protocols described, examples of their functioning will be presented, and their complexity and potential for use in practical applications will be determined. Full article
(This article belongs to the Special Issue Modern Computer Vision and Image Analysis)
Show Figures

Figure 1

27 pages, 3690 KB  
Article
RG-Based Region Incrementing Visual Cryptography with Abilities of OR and XOR Decryption
by Yu-Ru Lin and Justie Su-Tzu Juan
Symmetry 2024, 16(2), 153; https://doi.org/10.3390/sym16020153 - 28 Jan 2024
Cited by 3 | Viewed by 1838
Abstract
Visual cryptography (VC) is a cryptographic technique that allows the encryption of a secret image into multiple shares. When the shares of a qualified subset are superimposed, the original secret image can be visually recovered. Region incremental visual cryptography (RIVC) is a class [...] Read more.
Visual cryptography (VC) is a cryptographic technique that allows the encryption of a secret image into multiple shares. When the shares of a qualified subset are superimposed, the original secret image can be visually recovered. Region incremental visual cryptography (RIVC) is a class of visual cryptography; it encrypts a single image into a shared image with multiple levels of secrecy, and when decrypted, the secret image of each region can be gradually recovered. Traditional VC encrypts two black-and-white images, and its recovery method is equivalent to a logical OR operation. To obtain a better recognizability of the restored image, the XORoperator becomes a simple and efficient method of encryption and decryption. Because the XOR operation needs extra cost or equipment, if the equipment cannot be obtained, the scheme can be more flexible if the secret can still be restored by using OR decryption (superimpose). In this paper, we propose a novel RIVC that allows encoding multiple secret regions of a secret image into n random grids. Both the OR operation and the XOR operation can be used as operations during decryption. The proposed scheme is evaluated by simulation, and the experimental result shows its correctness, effectiveness and practicability. Full article
(This article belongs to the Special Issue Symmetry and Asymmetry in Information Security and Network Security)
Show Figures

Figure 1

Back to TopTop