Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 23
Page No. 8600 - 8608

Halftone Visual Crytography Schmeme for Color Image using Dynamic Codebook and Chaotic Map

Authors : Rasha Subhi Hameed and Abdul-Wahab Sami Ibrahim

References

Alex, N.S. and L.J. Anbarasi, 2011. Enhanced image secret sharing via error diffusion in halftone visual cryptography. Proceedings of the 3rd International Conference on Electronics Computer Technology Vol. 2, April 8-10, 2011, IEEE, Kanyakumari, India, ISBN:978-1-4244-8678-6, pp: 393-397.

Badal, N., 2017. Approaches of visual cryptography for gray scale and color images using error-diffusion halftoning technic. Intl. J. Comput. Sci. Inf. Technol. Secur., 7: 7-16.
Direct Link  |  

Chen, W.K., 2013. Image sharing method for gray-level images. J. Syst. Softw., 86: 581-585.
CrossRef  |  

Hodeish, M.E. and V.T. Humbe, 2018. An optimized halftone visual cryptography scheme using error diffusion. Multimedia Tools Appl., 77: 24937-24953.
CrossRef  |  Direct Link  |  

Kumar, R.R. and S. Chandramathi, 2016. Color visual cryptography scheme for natural images using complement cover and share authentication. Medwell Asian J. Inf. Technol., 15: 2656-2662.
CrossRef  |  Direct Link  |  

Liu, F. and C. Wu, 2011. Embedded extended visual cryptography schemes. IEEE Trans. Inform. Forensics Secur., 6: 307-322.
CrossRef  |  

Mishra, S.K. and K. Biswaranjan, 2015. Extended visual cryptography for general access structures using random grids. Proceedings of the 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Auguest 10-13, 2015, IEEE, Kochi, India, ISBN:978-1-4799-8790-0, pp: 1924-1929.

Noar, M. and A. Shamir, 1995. Visual Cryptography. In: Advance in Cryptography: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques Perugia, De Santis, A. (Ed.). Springer, Netherlands, ISBN: 9783540601760, pp: 1-12.

Pahuja, S. and S.S. Kasana, 2017. Halftone visual cryptography for color images. Proceedings of the 2017 International Conference on Computer, Communications and Electronics (Comptelix), July 1-2, 2017, IEEE, Jaipur, India, ISBN:978-1-5090-4709-3, pp: 281-285.

Quan, C., J. Jung, H. Lee, D. Kang and D. Won, 2018. Cryptanalysis of a chaotic Chebyshev polynomials based remote user authentication scheme. Proceedings of theInternational Conference on Information Networking (ICOIN), January 10-12, 2018, IEEE, Chiang Mai, Thailand, ISBN:978-1-5386-2291-9, pp: 438-441.

Wang, Z., G.R. Arce and G. Di Crescenzo, 2009. Halftone visual cryptography via error diffusion. IEEE Trans. Inform. Forensics Secur., 4: 383-396.
CrossRef  |  

Xiao, L., G. Xuan and Y. Wu, 2018. Research on an improved chaotic spread spectrum sequence. Proceedings of theIEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), April 20-22, 2018, IEEE, Chengdu, China, ISBN:978-1-5386-4302-0, pp: 420-423.

Zhou, Z., G.R. Arce and G. di Crescenzo, 2006. Halftone visual cryptography. IEEE. Trans. Image Process., 15: 2441-2453.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved