Inicio  /  Applied Sciences  /  Vol: 12 Par: 19 (2022)  /  Artículo
ARTÍCULO
TITULO

XOR-Based (n, n) Visual Cryptography Schemes for Grayscale or Color Images with Meaningful Shares

Yu-Hong Chen and Justie Su-Tzu Juan    

Resumen

XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle of XOR-based VCS is to encrypt a secret image into several encrypted images, called shares. No information about the secret can be obtained from any of the shares, and after applying the logical XOR operation to stack these shares, the original secret image can be recovered. In this paper, we present a new XOR-based VCS for grayscale or a color secret image. This scheme encrypts the secret grayscale (or color) image into n meaningful grayscale (or color) shares, which can import n difference cover images. After stacking n shares using the XOR operation, the original secret image can be completely restored. Both the theoretical proof and experimental results show that our method is accurate and efficient. To the best of our knowledge, ours is the only scheme that currently provides this functionality for grayscale and color secret images.

 Artículos similares

       
 
Ibrahim Abunadi, Hanan Abdullah Mengash, Saud S. Alotaibi, Mashael M. Asiri, Manar Ahmed Hamza, Abu Sarwar Zamani, Abdelwahed Motwakel and Ishfaq Yaseen    
Recent developments of semiconductor and communication technologies have resulted in the interconnection of numerous devices in offering seamless communication and services, which is termed as Internet of Everything (IoE). It is a subset of Internet of T... ver más
Revista: Applied Sciences

 
Jose Juan Garcia-Hernandez, Claudia Feregrino-Uribe, Alejandra Menendez-Ortiz and Dan Williams Robledo-Cruz    
In the literature, robust reversible watermarking schemes (RWSs) allow the extraction of watermarks after the images have suffered attacks; however, the modified images are compromised. On the other hand, self-recovery schemes will restore the compromise... ver más
Revista: Applied Sciences

 
Hala A. Naman,Naseer Ali Hussien,Mohand Lokman Al-dabag,Haider Th.Salim Alrikabi     Pág. pp. 172 - 183
One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion ... ver más

 
Ching-Yu Yang and Ja-Ling Wu    
During medical treatment, personal privacy is involved and must be protected. Healthcare institutions have to keep medical images or health information secret unless they have permission from the data owner to disclose them. Reversible data hiding (RDH) ... ver más
Revista: Computers

 
Cheonshik Kim, Dong-Kyoo Shin, Ching-Nung Yang and Lu Leng    
The image-based data hiding method is a technology used to transmit confidential information secretly. Since images (e.g., grayscale images) usually have sufficient redundancy information, they are a very suitable medium for hiding data. Absolute Moment ... ver más
Revista: Applied Sciences