Adaptive halftoned visual cryptography with improved quality and security
Abstract Visual Cryptography Scheme (VCS) is a cryptographic technique which can hide image based secrets. Even though VCS has the major advantage that the decoding can be done with the help of Human Visual System (HVS), yet it does not provide sufficient reconstruction quality. Hence, Two in One Im...
Ausführliche Beschreibung
Autor*in: |
Sridhar, Srividhya [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2015 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer Science+Business Media New York 2015 |
---|
Übergeordnetes Werk: |
Enthalten in: Multimedia tools and applications - Springer US, 1995, 76(2015), 1 vom: 20. Nov., Seite 815-834 |
---|---|
Übergeordnetes Werk: |
volume:76 ; year:2015 ; number:1 ; day:20 ; month:11 ; pages:815-834 |
Links: |
---|
DOI / URN: |
10.1007/s11042-015-3066-7 |
---|
Katalog-ID: |
OLC2035029007 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2035029007 | ||
003 | DE-627 | ||
005 | 20230503193007.0 | ||
007 | tu | ||
008 | 200819s2015 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s11042-015-3066-7 |2 doi | |
035 | |a (DE-627)OLC2035029007 | ||
035 | |a (DE-He213)s11042-015-3066-7-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 070 |a 004 |q VZ |
100 | 1 | |a Sridhar, Srividhya |e verfasserin |4 aut | |
245 | 1 | 0 | |a Adaptive halftoned visual cryptography with improved quality and security |
264 | 1 | |c 2015 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Springer Science+Business Media New York 2015 | ||
520 | |a Abstract Visual Cryptography Scheme (VCS) is a cryptographic technique which can hide image based secrets. Even though VCS has the major advantage that the decoding can be done with the help of Human Visual System (HVS), yet it does not provide sufficient reconstruction quality. Hence, Two in One Image Secret Sharing Scheme (TiOISSS) is used which provides two decoding phases. However, the existing TiOISSS method has several limitations. In this work, a Modified TiOISSS is proposed in which an adaptive threshold is used for halftoning, which changes depending on the nature of the pixels present in image. By this, the quality of reconstructed secret image is improved in the first decoding stage compared to the existing scheme. In addition, the security is also enhanced by pixel and bit level permutation with a 64 bit key and embedding the key in Gray VCS shadows. To verify the authenticity of the image, a secret message is also embedded in the shadows. Security analysis shows that the Modified TiOISSS is robust to Brute Force and Man-in-Middle attacks. | ||
650 | 4 | |a Visual cryptography | |
650 | 4 | |a Halftoning | |
650 | 4 | |a Adaptive halftoning | |
650 | 4 | |a Polynomial image secret sharing | |
700 | 1 | |a Sathishkumar, R. |4 aut | |
700 | 1 | |a Sudha, Gnanou Florence |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Multimedia tools and applications |d Springer US, 1995 |g 76(2015), 1 vom: 20. Nov., Seite 815-834 |w (DE-627)189064145 |w (DE-600)1287642-2 |w (DE-576)052842126 |x 1380-7501 |7 nnns |
773 | 1 | 8 | |g volume:76 |g year:2015 |g number:1 |g day:20 |g month:11 |g pages:815-834 |
856 | 4 | 1 | |u https://doi.org/10.1007/s11042-015-3066-7 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a SSG-OLC-BUB | ||
912 | |a SSG-OLC-MKW | ||
912 | |a GBV_ILN_70 | ||
951 | |a AR | ||
952 | |d 76 |j 2015 |e 1 |b 20 |c 11 |h 815-834 |
author_variant |
s s ss r s rs g f s gf gfs |
---|---|
matchkey_str |
article:13807501:2015----::dpieafoevsacytgahwtipoeq |
hierarchy_sort_str |
2015 |
publishDate |
2015 |
allfields |
10.1007/s11042-015-3066-7 doi (DE-627)OLC2035029007 (DE-He213)s11042-015-3066-7-p DE-627 ger DE-627 rakwb eng 070 004 VZ Sridhar, Srividhya verfasserin aut Adaptive halftoned visual cryptography with improved quality and security 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2015 Abstract Visual Cryptography Scheme (VCS) is a cryptographic technique which can hide image based secrets. Even though VCS has the major advantage that the decoding can be done with the help of Human Visual System (HVS), yet it does not provide sufficient reconstruction quality. Hence, Two in One Image Secret Sharing Scheme (TiOISSS) is used which provides two decoding phases. However, the existing TiOISSS method has several limitations. In this work, a Modified TiOISSS is proposed in which an adaptive threshold is used for halftoning, which changes depending on the nature of the pixels present in image. By this, the quality of reconstructed secret image is improved in the first decoding stage compared to the existing scheme. In addition, the security is also enhanced by pixel and bit level permutation with a 64 bit key and embedding the key in Gray VCS shadows. To verify the authenticity of the image, a secret message is also embedded in the shadows. Security analysis shows that the Modified TiOISSS is robust to Brute Force and Man-in-Middle attacks. Visual cryptography Halftoning Adaptive halftoning Polynomial image secret sharing Sathishkumar, R. aut Sudha, Gnanou Florence aut Enthalten in Multimedia tools and applications Springer US, 1995 76(2015), 1 vom: 20. Nov., Seite 815-834 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:76 year:2015 number:1 day:20 month:11 pages:815-834 https://doi.org/10.1007/s11042-015-3066-7 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 76 2015 1 20 11 815-834 |
spelling |
10.1007/s11042-015-3066-7 doi (DE-627)OLC2035029007 (DE-He213)s11042-015-3066-7-p DE-627 ger DE-627 rakwb eng 070 004 VZ Sridhar, Srividhya verfasserin aut Adaptive halftoned visual cryptography with improved quality and security 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2015 Abstract Visual Cryptography Scheme (VCS) is a cryptographic technique which can hide image based secrets. Even though VCS has the major advantage that the decoding can be done with the help of Human Visual System (HVS), yet it does not provide sufficient reconstruction quality. Hence, Two in One Image Secret Sharing Scheme (TiOISSS) is used which provides two decoding phases. However, the existing TiOISSS method has several limitations. In this work, a Modified TiOISSS is proposed in which an adaptive threshold is used for halftoning, which changes depending on the nature of the pixels present in image. By this, the quality of reconstructed secret image is improved in the first decoding stage compared to the existing scheme. In addition, the security is also enhanced by pixel and bit level permutation with a 64 bit key and embedding the key in Gray VCS shadows. To verify the authenticity of the image, a secret message is also embedded in the shadows. Security analysis shows that the Modified TiOISSS is robust to Brute Force and Man-in-Middle attacks. Visual cryptography Halftoning Adaptive halftoning Polynomial image secret sharing Sathishkumar, R. aut Sudha, Gnanou Florence aut Enthalten in Multimedia tools and applications Springer US, 1995 76(2015), 1 vom: 20. Nov., Seite 815-834 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:76 year:2015 number:1 day:20 month:11 pages:815-834 https://doi.org/10.1007/s11042-015-3066-7 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 76 2015 1 20 11 815-834 |
allfields_unstemmed |
10.1007/s11042-015-3066-7 doi (DE-627)OLC2035029007 (DE-He213)s11042-015-3066-7-p DE-627 ger DE-627 rakwb eng 070 004 VZ Sridhar, Srividhya verfasserin aut Adaptive halftoned visual cryptography with improved quality and security 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2015 Abstract Visual Cryptography Scheme (VCS) is a cryptographic technique which can hide image based secrets. Even though VCS has the major advantage that the decoding can be done with the help of Human Visual System (HVS), yet it does not provide sufficient reconstruction quality. Hence, Two in One Image Secret Sharing Scheme (TiOISSS) is used which provides two decoding phases. However, the existing TiOISSS method has several limitations. In this work, a Modified TiOISSS is proposed in which an adaptive threshold is used for halftoning, which changes depending on the nature of the pixels present in image. By this, the quality of reconstructed secret image is improved in the first decoding stage compared to the existing scheme. In addition, the security is also enhanced by pixel and bit level permutation with a 64 bit key and embedding the key in Gray VCS shadows. To verify the authenticity of the image, a secret message is also embedded in the shadows. Security analysis shows that the Modified TiOISSS is robust to Brute Force and Man-in-Middle attacks. Visual cryptography Halftoning Adaptive halftoning Polynomial image secret sharing Sathishkumar, R. aut Sudha, Gnanou Florence aut Enthalten in Multimedia tools and applications Springer US, 1995 76(2015), 1 vom: 20. Nov., Seite 815-834 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:76 year:2015 number:1 day:20 month:11 pages:815-834 https://doi.org/10.1007/s11042-015-3066-7 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 76 2015 1 20 11 815-834 |
allfieldsGer |
10.1007/s11042-015-3066-7 doi (DE-627)OLC2035029007 (DE-He213)s11042-015-3066-7-p DE-627 ger DE-627 rakwb eng 070 004 VZ Sridhar, Srividhya verfasserin aut Adaptive halftoned visual cryptography with improved quality and security 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2015 Abstract Visual Cryptography Scheme (VCS) is a cryptographic technique which can hide image based secrets. Even though VCS has the major advantage that the decoding can be done with the help of Human Visual System (HVS), yet it does not provide sufficient reconstruction quality. Hence, Two in One Image Secret Sharing Scheme (TiOISSS) is used which provides two decoding phases. However, the existing TiOISSS method has several limitations. In this work, a Modified TiOISSS is proposed in which an adaptive threshold is used for halftoning, which changes depending on the nature of the pixels present in image. By this, the quality of reconstructed secret image is improved in the first decoding stage compared to the existing scheme. In addition, the security is also enhanced by pixel and bit level permutation with a 64 bit key and embedding the key in Gray VCS shadows. To verify the authenticity of the image, a secret message is also embedded in the shadows. Security analysis shows that the Modified TiOISSS is robust to Brute Force and Man-in-Middle attacks. Visual cryptography Halftoning Adaptive halftoning Polynomial image secret sharing Sathishkumar, R. aut Sudha, Gnanou Florence aut Enthalten in Multimedia tools and applications Springer US, 1995 76(2015), 1 vom: 20. Nov., Seite 815-834 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:76 year:2015 number:1 day:20 month:11 pages:815-834 https://doi.org/10.1007/s11042-015-3066-7 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 76 2015 1 20 11 815-834 |
allfieldsSound |
10.1007/s11042-015-3066-7 doi (DE-627)OLC2035029007 (DE-He213)s11042-015-3066-7-p DE-627 ger DE-627 rakwb eng 070 004 VZ Sridhar, Srividhya verfasserin aut Adaptive halftoned visual cryptography with improved quality and security 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2015 Abstract Visual Cryptography Scheme (VCS) is a cryptographic technique which can hide image based secrets. Even though VCS has the major advantage that the decoding can be done with the help of Human Visual System (HVS), yet it does not provide sufficient reconstruction quality. Hence, Two in One Image Secret Sharing Scheme (TiOISSS) is used which provides two decoding phases. However, the existing TiOISSS method has several limitations. In this work, a Modified TiOISSS is proposed in which an adaptive threshold is used for halftoning, which changes depending on the nature of the pixels present in image. By this, the quality of reconstructed secret image is improved in the first decoding stage compared to the existing scheme. In addition, the security is also enhanced by pixel and bit level permutation with a 64 bit key and embedding the key in Gray VCS shadows. To verify the authenticity of the image, a secret message is also embedded in the shadows. Security analysis shows that the Modified TiOISSS is robust to Brute Force and Man-in-Middle attacks. Visual cryptography Halftoning Adaptive halftoning Polynomial image secret sharing Sathishkumar, R. aut Sudha, Gnanou Florence aut Enthalten in Multimedia tools and applications Springer US, 1995 76(2015), 1 vom: 20. Nov., Seite 815-834 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:76 year:2015 number:1 day:20 month:11 pages:815-834 https://doi.org/10.1007/s11042-015-3066-7 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 76 2015 1 20 11 815-834 |
language |
English |
source |
Enthalten in Multimedia tools and applications 76(2015), 1 vom: 20. Nov., Seite 815-834 volume:76 year:2015 number:1 day:20 month:11 pages:815-834 |
sourceStr |
Enthalten in Multimedia tools and applications 76(2015), 1 vom: 20. Nov., Seite 815-834 volume:76 year:2015 number:1 day:20 month:11 pages:815-834 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Visual cryptography Halftoning Adaptive halftoning Polynomial image secret sharing |
dewey-raw |
070 |
isfreeaccess_bool |
false |
container_title |
Multimedia tools and applications |
authorswithroles_txt_mv |
Sridhar, Srividhya @@aut@@ Sathishkumar, R. @@aut@@ Sudha, Gnanou Florence @@aut@@ |
publishDateDaySort_date |
2015-11-20T00:00:00Z |
hierarchy_top_id |
189064145 |
dewey-sort |
270 |
id |
OLC2035029007 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035029007</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503193007.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2015 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-015-3066-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035029007</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-015-3066-7-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sridhar, Srividhya</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Adaptive halftoned visual cryptography with improved quality and security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media New York 2015</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Visual Cryptography Scheme (VCS) is a cryptographic technique which can hide image based secrets. Even though VCS has the major advantage that the decoding can be done with the help of Human Visual System (HVS), yet it does not provide sufficient reconstruction quality. Hence, Two in One Image Secret Sharing Scheme (TiOISSS) is used which provides two decoding phases. However, the existing TiOISSS method has several limitations. In this work, a Modified TiOISSS is proposed in which an adaptive threshold is used for halftoning, which changes depending on the nature of the pixels present in image. By this, the quality of reconstructed secret image is improved in the first decoding stage compared to the existing scheme. In addition, the security is also enhanced by pixel and bit level permutation with a 64 bit key and embedding the key in Gray VCS shadows. To verify the authenticity of the image, a secret message is also embedded in the shadows. Security analysis shows that the Modified TiOISSS is robust to Brute Force and Man-in-Middle attacks.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Visual cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Halftoning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Adaptive halftoning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Polynomial image secret sharing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sathishkumar, R.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sudha, Gnanou Florence</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">76(2015), 1 vom: 20. Nov., Seite 815-834</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:76</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:1</subfield><subfield code="g">day:20</subfield><subfield code="g">month:11</subfield><subfield code="g">pages:815-834</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-015-3066-7</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">76</subfield><subfield code="j">2015</subfield><subfield code="e">1</subfield><subfield code="b">20</subfield><subfield code="c">11</subfield><subfield code="h">815-834</subfield></datafield></record></collection>
|
author |
Sridhar, Srividhya |
spellingShingle |
Sridhar, Srividhya ddc 070 misc Visual cryptography misc Halftoning misc Adaptive halftoning misc Polynomial image secret sharing Adaptive halftoned visual cryptography with improved quality and security |
authorStr |
Sridhar, Srividhya |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)189064145 |
format |
Article |
dewey-ones |
070 - News media, journalism & publishing 004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1380-7501 |
topic_title |
070 004 VZ Adaptive halftoned visual cryptography with improved quality and security Visual cryptography Halftoning Adaptive halftoning Polynomial image secret sharing |
topic |
ddc 070 misc Visual cryptography misc Halftoning misc Adaptive halftoning misc Polynomial image secret sharing |
topic_unstemmed |
ddc 070 misc Visual cryptography misc Halftoning misc Adaptive halftoning misc Polynomial image secret sharing |
topic_browse |
ddc 070 misc Visual cryptography misc Halftoning misc Adaptive halftoning misc Polynomial image secret sharing |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Multimedia tools and applications |
hierarchy_parent_id |
189064145 |
dewey-tens |
070 - News media, journalism & publishing 000 - Computer science, knowledge & systems |
hierarchy_top_title |
Multimedia tools and applications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 |
title |
Adaptive halftoned visual cryptography with improved quality and security |
ctrlnum |
(DE-627)OLC2035029007 (DE-He213)s11042-015-3066-7-p |
title_full |
Adaptive halftoned visual cryptography with improved quality and security |
author_sort |
Sridhar, Srividhya |
journal |
Multimedia tools and applications |
journalStr |
Multimedia tools and applications |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2015 |
contenttype_str_mv |
txt |
container_start_page |
815 |
author_browse |
Sridhar, Srividhya Sathishkumar, R. Sudha, Gnanou Florence |
container_volume |
76 |
class |
070 004 VZ |
format_se |
Aufsätze |
author-letter |
Sridhar, Srividhya |
doi_str_mv |
10.1007/s11042-015-3066-7 |
dewey-full |
070 004 |
title_sort |
adaptive halftoned visual cryptography with improved quality and security |
title_auth |
Adaptive halftoned visual cryptography with improved quality and security |
abstract |
Abstract Visual Cryptography Scheme (VCS) is a cryptographic technique which can hide image based secrets. Even though VCS has the major advantage that the decoding can be done with the help of Human Visual System (HVS), yet it does not provide sufficient reconstruction quality. Hence, Two in One Image Secret Sharing Scheme (TiOISSS) is used which provides two decoding phases. However, the existing TiOISSS method has several limitations. In this work, a Modified TiOISSS is proposed in which an adaptive threshold is used for halftoning, which changes depending on the nature of the pixels present in image. By this, the quality of reconstructed secret image is improved in the first decoding stage compared to the existing scheme. In addition, the security is also enhanced by pixel and bit level permutation with a 64 bit key and embedding the key in Gray VCS shadows. To verify the authenticity of the image, a secret message is also embedded in the shadows. Security analysis shows that the Modified TiOISSS is robust to Brute Force and Man-in-Middle attacks. © Springer Science+Business Media New York 2015 |
abstractGer |
Abstract Visual Cryptography Scheme (VCS) is a cryptographic technique which can hide image based secrets. Even though VCS has the major advantage that the decoding can be done with the help of Human Visual System (HVS), yet it does not provide sufficient reconstruction quality. Hence, Two in One Image Secret Sharing Scheme (TiOISSS) is used which provides two decoding phases. However, the existing TiOISSS method has several limitations. In this work, a Modified TiOISSS is proposed in which an adaptive threshold is used for halftoning, which changes depending on the nature of the pixels present in image. By this, the quality of reconstructed secret image is improved in the first decoding stage compared to the existing scheme. In addition, the security is also enhanced by pixel and bit level permutation with a 64 bit key and embedding the key in Gray VCS shadows. To verify the authenticity of the image, a secret message is also embedded in the shadows. Security analysis shows that the Modified TiOISSS is robust to Brute Force and Man-in-Middle attacks. © Springer Science+Business Media New York 2015 |
abstract_unstemmed |
Abstract Visual Cryptography Scheme (VCS) is a cryptographic technique which can hide image based secrets. Even though VCS has the major advantage that the decoding can be done with the help of Human Visual System (HVS), yet it does not provide sufficient reconstruction quality. Hence, Two in One Image Secret Sharing Scheme (TiOISSS) is used which provides two decoding phases. However, the existing TiOISSS method has several limitations. In this work, a Modified TiOISSS is proposed in which an adaptive threshold is used for halftoning, which changes depending on the nature of the pixels present in image. By this, the quality of reconstructed secret image is improved in the first decoding stage compared to the existing scheme. In addition, the security is also enhanced by pixel and bit level permutation with a 64 bit key and embedding the key in Gray VCS shadows. To verify the authenticity of the image, a secret message is also embedded in the shadows. Security analysis shows that the Modified TiOISSS is robust to Brute Force and Man-in-Middle attacks. © Springer Science+Business Media New York 2015 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 |
container_issue |
1 |
title_short |
Adaptive halftoned visual cryptography with improved quality and security |
url |
https://doi.org/10.1007/s11042-015-3066-7 |
remote_bool |
false |
author2 |
Sathishkumar, R. Sudha, Gnanou Florence |
author2Str |
Sathishkumar, R. Sudha, Gnanou Florence |
ppnlink |
189064145 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s11042-015-3066-7 |
up_date |
2024-07-03T23:30:23.991Z |
_version_ |
1803602544811835392 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035029007</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503193007.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2015 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-015-3066-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035029007</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-015-3066-7-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sridhar, Srividhya</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Adaptive halftoned visual cryptography with improved quality and security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media New York 2015</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Visual Cryptography Scheme (VCS) is a cryptographic technique which can hide image based secrets. Even though VCS has the major advantage that the decoding can be done with the help of Human Visual System (HVS), yet it does not provide sufficient reconstruction quality. Hence, Two in One Image Secret Sharing Scheme (TiOISSS) is used which provides two decoding phases. However, the existing TiOISSS method has several limitations. In this work, a Modified TiOISSS is proposed in which an adaptive threshold is used for halftoning, which changes depending on the nature of the pixels present in image. By this, the quality of reconstructed secret image is improved in the first decoding stage compared to the existing scheme. In addition, the security is also enhanced by pixel and bit level permutation with a 64 bit key and embedding the key in Gray VCS shadows. To verify the authenticity of the image, a secret message is also embedded in the shadows. Security analysis shows that the Modified TiOISSS is robust to Brute Force and Man-in-Middle attacks.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Visual cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Halftoning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Adaptive halftoning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Polynomial image secret sharing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sathishkumar, R.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sudha, Gnanou Florence</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">76(2015), 1 vom: 20. Nov., Seite 815-834</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:76</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:1</subfield><subfield code="g">day:20</subfield><subfield code="g">month:11</subfield><subfield code="g">pages:815-834</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-015-3066-7</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">76</subfield><subfield code="j">2015</subfield><subfield code="e">1</subfield><subfield code="b">20</subfield><subfield code="c">11</subfield><subfield code="h">815-834</subfield></datafield></record></collection>
|
score |
7.402231 |