Clustered-minority-pixel error diffusion

2004 ◽  
Vol 21 (7) ◽  
pp. 1148 ◽  
Author(s):  
Pingshan Li ◽  
Jan P. Allebach
Keyword(s):  
2017 ◽  
Vol 2017 (18) ◽  
pp. 123-129
Author(s):  
Takuma Kiyotomo ◽  
Keisuke Hoshino ◽  
Yuki Tsukano ◽  
Hiroki Kibushi ◽  
Takahiko Horiuchi

2019 ◽  
Vol 2019 (14) ◽  
pp. 104-1-104-5
Author(s):  
Takuma Kiyotomo ◽  
Midori Tanaka ◽  
Takahiko Horiuchi

Symmetry ◽  
2020 ◽  
Vol 13 (1) ◽  
pp. 65
Author(s):  
Lu Wang ◽  
Bin Yan ◽  
Hong-Mei Yang ◽  
Jeng-Shyang Pan

Visual cryptography (VC) has found numerous applications in privacy protection, online transaction security, and voting security, etc. To counteract potential cheating attacks, Lin et al. proposed flip visual cryptography in 2010, where a second secret image can be revealed by stacking one share with a flipped version of another share. The second secret image can be designed as an additional verification mechanism. However, Lin’s scheme produces meaningless shares and is only applicable to binary secret images. It is interesting to explore whether it is possible to extend the flip VC to having cover images (i.e., extended VC) and these cover images are color images. This problem is challenging since too many restricting conditions need to be met. In this paper, we designed a flip VC for gray-scale and color cover images based on constraint error diffusion. We show that it is possible to meet all the constraints simultaneously. Compared with existing schemes, our scheme enjoys the following features: Color cover images, no computation needed for decoding, and no interference from cover image on the recovered secret image.


2003 ◽  
Author(s):  
Vishal Monga ◽  
Niranjan Damera-Venkata ◽  
Brian L. Evans

2013 ◽  
Vol 416-417 ◽  
pp. 1210-1213
Author(s):  
Hua Wen Ai ◽  
Ping Feng Liu ◽  
Sheng Cong Dong

In order to resist print and scan attacks, a kind of digital halftone image watermarking algorithm is proposed, which is based on the edge detection and improved error diffusion. The edge of gray image is gotten using canny detection. Calculate the noise visibility function values of the edge points. Then, sort the values in ascending order and select the size that equal to the length of watermark as the location of watermark embedding. While the grayscale image turns to halftone image using the improved error diffusion algorithm, binary watermark is embedded in the edge position. Watermark is pretreated with Arnold before embedding to improve the safety of watermark. Experiment results show that the algorithm is good resistance to print and scan attacks, while resistance to shearing, noise and jpeg compression attacks.


Sign in / Sign up

Export Citation Format

Share Document