International Journal of Soft Computing

Year: 2015
Volume: 10
Issue: 2
Page No. 175 - 182

A New Semantic Visual Cryptographic Protocol (SVCP) for Securing Multimedia Communications

Authors : A. John Blesswin, P. Visalakshi, M. Karnan and R. Sivakumar

References

Askari, N., H.M. Heys and C.R. Moloney, 2013. An extended visual cryptography scheme without pixel expansion for halftone images. Proceedings of the IEEE 26th Annual Canadian Conference on Electrical and Computer Engineering, May 5-8, 2013, Regina, SK., pp: 1-6.

Ateniese, G., C. Blundo, A. De Santis and D.R. Stinson, 1996. Visual cryptography for general access structures. Inform. Comput., 129: 86-106.
CrossRef  |  Direct Link  |  

Babu, C.R., M. Sridhar and B.R. Babu, 2013. Information hiding in gray scale images using pseudo-randomized visual cryptography algorithm for visual information security. Proceedings of the International Conference on Information Systems and Computer Networks, March 9-10, 2013, Mathura, pp: 195-199.

Borchert, B., 2007. Segment based visual cryptography. Taubingen University, WSI -2007, Germany.

Chan, C.K. and L.M. Cheng, 2004. Hiding data in images by simple LSB substitution. Pattern Recognit., 37: 469-474.
CrossRef  |  Direct Link  |  

Chang, C.C., C.C. Lin, T.H.N. Le and H.B. Le, 2009. Self-verifying visual secret sharing using error diffusion and interpolation techniques. IEEE Trans. Inform. Forensics Secur., 4: 790-801.
CrossRef  |  

Ciptasari, R.W., K.H. Rhee and K. Sakurai, 2014. An enhanced audio ownership protection scheme based on visual cryptography. EURASIP J. Inform. Secur.,. 10.1186/1687-417X-2014-2

Fang, L. and B. Yu, 2006. Research on pixel expansion of (2, n) visual threshold scheme. Proceedings of the IEEE International Symposium on Pervasive Computing and Apps, August 3-5, 2006, Urumqi, pp: 856-860.

Fridrich, J., 2009. Steganography in Digital Media: Principles, Algorithms and Applications. Cambridge University Press, Cambridge, England, ISBN-13: 978-0521190190, Pages: 462.

Ito, R., H. Kuwakado and H. Tanaka, 1999. Image size invariant visual cryptography. IEICE Trans. Fundam., E82-A: 2172-2177.
Direct Link  |  

Lee, K.H. and P.L. Chiu, 2012. An extended visual cryptography algorithm for general access structures. IEEE Trans. Inform. Forensics Secur., 7: 219-229.
CrossRef  |  

Li, L.C., 2007. Visual cryptography for meaningful shares. Master's Thesis, Institute of Communication Engineering, Tatung University.

Liu, F. and C. Wu, 2011. Embedded extended visual cryptography schemes. IEEE Trans. Inform. Forensics Secur., 6: 307-322.
CrossRef  |  

Lukac, R. and K.N. Plataniotis, 2005. Bit-level based secret sharing for image encryption. Pattern Recognit., 38: 767-772.
CrossRef  |  

Nakajima, M. and Y. Yamaguchi, 2002. Extended visual cryptography for natural images. J. WSCG., 10: 303-310.

Naor, M. and A. Shamir, 1994. Visual cryptography. Adv. Cryptol., 950: 1-12.

Rajitha, T., P.P. Kumar and V. Laxmi, 2012. Construction construction of extended visual cryptography of extended visual cryptography of extended visual cryptography scheme secret sharing for secret sharing. Int. J. Comput. Sci. Network, 1: 85-90.
Direct Link  |  

Wang, Z., G.R. Arce and G. Di Crescenzo, 2009. Halftone visual cryptography via error diffusion. IEEE Trans. Inform. Forensics Secur., 4: 383-396.
CrossRef  |  

Wang, Z.M., G.R. Arce and G. Di Crescenzo, 2006. Halftone visual cryptography via direct binary search. Proceedings of the 14th European Signal Processing Conference, September 4-8, 2006, Florence, Italy -.

Wu, C.C., 1998. A study on visual cryptography. Master Thesis, National Chiao Tung University, Taiwan, China.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved