Please use this identifier to cite or link to this item: https://doi.org/10.1117/1.1993625
DC FieldValue
dc.titleProgressive color visual cryptography
dc.contributor.authorJin, D.
dc.contributor.authorYan, W.-Q.
dc.contributor.authorKankanhalli, M.S.
dc.date.accessioned2013-07-04T07:35:01Z
dc.date.available2013-07-04T07:35:01Z
dc.date.issued2005
dc.identifier.citationJin, D., Yan, W.-Q., Kankanhalli, M.S. (2005). Progressive color visual cryptography. Journal of Electronic Imaging 14 (3) : 1-13. ScholarBank@NUS Repository. https://doi.org/10.1117/1.1993625
dc.identifier.issn10179909
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/39147
dc.description.abstractVisual cryptography is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that can be stacked together to approximately recover the original image. Unfortunately, it has not been used much primarily because the decryption process entails a severe degradation in image quality in terms of loss of resolution and contrast. Its usage is also hampered by the lack of proper techniques for handling grayscale and color images. We develop a novel technique that enables visual cryptography of color as well as gray-scale images. With the use of halftoning and a novel microblock encoding scheme, the technique has a unique flexibility that enables a single encryption of a color image but enables three types of decryptions on the same ciphertext. The three different types of decryptions enable the recovery of the image of varying qualities. The physical transparency stacking type of decryption enables the recovery of the traditional visual cryptography quality image. An enhanced stacking technique enables the decryption into a halftone quality image. Finally, a computation-based decryption scheme makes the perfect recovery of the original image possible. Based on this basic scheme, we establish a progressive mechanism to share color images at multiple resolutions. We extract shares from each resolution layer to construct a hierarchical structure; the images of different resolutions can then be restored by stacking the different shared images together. Thus, our technique enables flexible decryption. We implement our technique and present results. © 2005 SPIE and IS&T.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1117/1.1993625
dc.sourceScopus
dc.typeArticle
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.doi10.1117/1.1993625
dc.description.sourcetitleJournal of Electronic Imaging
dc.description.volume14
dc.description.issue3
dc.description.page1-13
dc.description.codenJEIME
dc.identifier.isiut000233222600019
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

SCOPUSTM   
Citations

122
checked on Dec 6, 2022

WEB OF SCIENCETM
Citations

87
checked on Dec 6, 2022

Page view(s)

175
checked on Nov 24, 2022

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.