Visible to the public Biblio

Filters: Keyword is tagged visual cryptography  [Clear All Filters]
2019-08-26
Chiu, Pei-Ling, Lee, Kai-Hui.  2018.  Optimization Based Adaptive Tagged Visual Cryptography. Proceedings of the Genetic and Evolutionary Computation Conference Companion. :33–34.
The Tagged Visual Cryptography Scheme (TVCS)1 adds tag images to the noise-like shares generated by the traditional VCS to improve the shares management of the traditional VCS. However, the existing TVCSs suffers visual quality of the recovered secret image may be degraded and there may be pixel expansion. This study proposes a Threshold Adaptive Tagged Visual Cryptography Scheme ((k, n)-ATVCS) to solve the above-mentioned problems. The ATVCS encryption problem is formulated in a mathematical optimization model, and an evolutionary algorithm is developed to find the optimal solution to the problem. The proposed (k, n)-ATVCS enables the encryptor to adjust the visual quality between the tag image and the secret image by tuning parameters. Experimental results show the correctness and effectiveness of this study.
2015-05-05
Yi-Hui Chen, Chi-Shiang Chan, Po-Yu Hsu, Wei-Lin Huang.  2014.  Tagged visual cryptography with access control. Multimedia and Expo Workshops (ICMEW), 2014 IEEE International Conference on. :1-5.

Visual cryptography is a way to encrypt the secret image into several meaningless share images. Noted that no information can be obtained if not all of the shares are collected. Stacking the share images, the secret image can be retrieved. The share images are meaningless to owner which results in difficult to manage. Tagged visual cryptography is a skill to print a pattern onto meaningless share images. After that, users can easily manage their own share images according to the printed pattern. Besides, access control is another popular topic to allow a user or a group to see the own authorizations. In this paper, a self-authentication mechanism with lossless construction ability for image secret sharing scheme is proposed. The experiments provide the positive data to show the feasibility of the proposed scheme.