visual secret sharing
Recently Published Documents


TOTAL DOCUMENTS

317
(FIVE YEARS 71)

H-INDEX

24
(FIVE YEARS 2)

Author(s):  
Nikita Bhoskar

Abstract: The quick response code (QR) has become most popular barcode because of its larger data capacity and increased damage resistance. Barcode scanners can easily extract information hidden in the QR code when scanning data forms. However, some confidential data stored directly in QR codes are not secure in real world QR apps. To proposed approach to visual secret sharing scheme to encode a secret QR code into distinct shares. In assessment with other techniques, the shares in proposed scheme are valid QR codes that may be decoded with some unique that means of a trendy QR code reader, so that escaping increases suspicious attackers. An existing sharing technique is subjected to loss of security. On this premise, consider the strategy for (k, n) get to structures by using the (k, k) sharing occurrence on each k-member subset dependent on specific relationship. In addition, the secret message is recovered with the aid of XOR-ing the qualified shares. This operation which can effortlessly be achieved the use of smartphones or different QR scanning gadgets. Contribution work is, working on optimal partitioning methods and compare original message with shared message using hashing techniques. Keywords: Hashing, partitioning algorithm, error correction capacity, high security, Quick Response code, visual secret sharing scheme


2021 ◽  
Vol 22 (4) ◽  
pp. 803-810
Author(s):  
John Blesswin A. John Blesswin A. ◽  
Selva Mary G. John Blesswin A. ◽  
Manoj Kumar S. Selva Mary G.


2021 ◽  
Vol 13 (4) ◽  
pp. 16-25
Author(s):  
Xuemei Zhao ◽  
Tongtong Zhang ◽  
Jun Liu ◽  
Canju Lu ◽  
Huan Lu ◽  
...  

Economics has some limitations, such as insecure multiple parties economical investment decision and leakage of business quotation. Secret image sharing (SIS) for (k, n)-threshold is such a technique that protects an image through splitting it into n shadows, a.k.a. shadow images or shares, assigned to n corresponding participants. The secret image can be disclosed by obtaining k or more shadows. Polynomial-based SIS and visual secret sharing (VSS) are the chief research branches. This paper first analyzes the insecure issues in economics and then introduces two methods to apply typical SIS schemes to improve economical security. Finally, experiments are realized to illustrate the efficiency of the methods.


2021 ◽  
pp. 2100175
Author(s):  
Zhenfei Li ◽  
Dajun Zhang ◽  
Ji Liu ◽  
Jin Zhang ◽  
Linda Shao ◽  
...  

Author(s):  
Minh Thanh Tạ

This paper proposes a new watermarking method for digital image by composing the DWT-QIM based embedding with visual secret sharing (VSS) method. Firstly, the watermark image is separated into $n$ shares by using the $k-out-of-n$ method, called $(k,n)$ visual secret sharing. One of share is employed in order to embed into the original image for copyright protection. Another $(n-1)$ of shares are registered with Vietnam Copyright Department. When the dispute happens, the verifier can extract the watermark information from the watermarked image, then, decode it with $(k-1)$ shares chosen from $(n-1)$ shares to achieve the copyright information. Our experimental results show that our proposed method works efficiently on the digital images.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Yongjie Wang ◽  
Jia Chen ◽  
Qinghong Gong ◽  
Xuehu Yan ◽  
Yuyuan Sun

In some particular scenes, the shadows need to be given different weights to represent the participants’ status or importance. And during the reconstruction, participants with different weights obtain various quality reconstructed images. However, the existing schemes based on visual secret sharing (VSS) and the Chinese remainder theorem (CRT) have some disadvantages. In this paper, we propose a weighted polynomial-based SIS scheme in the field of GF (257). We use k , k threshold polynomial-based secret image sharing (SIS) to generate k shares and assign them corresponding weights. Then, the remaining n − k shares are randomly filled with invalid value 0 or 255. When the threshold is satisfied, the number and weight of share can affect the reconstructed image’s quality. Our proposed scheme has the property of lossless recovery. And the average light transmission of shares in our scheme is identical. Experiments and theoretical analysis show that the proposed scheme is practical and feasible. Besides, the quality of the reconstructed image is consistent with the theoretical derivation.


Sign in / Sign up

Export Citation Format

Share Document