Halftoning Based Visual Secret Sharing (Vss). Furht, B., editor In Encyclopedia of Multimedia, pages 277–277. Springer US, 2008. 00000
Paper abstract bibtex DefinitionIn Visual Secret Sharing based on halftoning, the continuous-tone image is first transformed into a halftone image, and then the VSS is applied.Since VSS-schemes require binary inputs [1, 2], the continuous-tone image is first transformed into a halftone image using the density of the net dots to simulate the intensity levels [3]. In the sequence, the halftone version of the secret image is encrypted into the n shares using the conventional (k, n) visual cryptography based encryption process. The secret image is visually revealed if at least k shares are available for decryption and stacked together on an overhead projector or specialized display.Due to the nature of visual cryptography, and the expansion and contrast properties of (k,n)-VSS schemes, both binary (conventional) and halftoning-based VSS schemes usually produce shares and decrypted images with expanded dimensions compared to those of the original input (secret) image. In addition, VSS schemes introduce ...
@incollection{furht_halftoning_2008,
title = {Halftoning {Based} {Visual} {Secret} {Sharing} ({Vss})},
copyright = {©2008 Springer-Verlag},
isbn = {978-0-387-74724-8 978-0-387-78414-4},
url = {http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_330},
abstract = {DefinitionIn Visual Secret Sharing based on halftoning, the continuous-tone image is first transformed into a halftone image, and then the VSS is applied.Since VSS-schemes require binary inputs [1, 2], the continuous-tone image is first transformed into a halftone image using the density of the net dots to simulate the intensity levels [3]. In the sequence, the halftone version of the secret image is encrypted into the n shares using the conventional (k, n) visual cryptography based encryption process. The secret image is visually revealed if at least k shares are available for decryption and stacked together on an overhead projector or specialized display.Due to the nature of visual cryptography, and the expansion and contrast properties of (k,n)-VSS schemes, both binary (conventional) and halftoning-based VSS schemes usually produce shares and decrypted images with expanded dimensions compared to those of the original input (secret) image. In addition, VSS schemes introduce ...},
language = {en},
urldate = {2016-05-03},
booktitle = {Encyclopedia of {Multimedia}},
publisher = {Springer US},
editor = {Furht, Borko},
year = {2008},
note = {00000},
pages = {277--277}
}
Downloads: 0
{"_id":"XDJRwDqTYihs4vxCD","bibbaseid":"furht-halftoningbasedvisualsecretsharingvss-2008","authorIDs":[],"bibdata":{"bibtype":"incollection","type":"incollection","title":"Halftoning Based Visual Secret Sharing (Vss)","copyright":"©2008 Springer-Verlag","isbn":"978-0-387-74724-8 978-0-387-78414-4","url":"http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_330","abstract":"DefinitionIn Visual Secret Sharing based on halftoning, the continuous-tone image is first transformed into a halftone image, and then the VSS is applied.Since VSS-schemes require binary inputs [1, 2], the continuous-tone image is first transformed into a halftone image using the density of the net dots to simulate the intensity levels [3]. In the sequence, the halftone version of the secret image is encrypted into the n shares using the conventional (k, n) visual cryptography based encryption process. The secret image is visually revealed if at least k shares are available for decryption and stacked together on an overhead projector or specialized display.Due to the nature of visual cryptography, and the expansion and contrast properties of (k,n)-VSS schemes, both binary (conventional) and halftoning-based VSS schemes usually produce shares and decrypted images with expanded dimensions compared to those of the original input (secret) image. In addition, VSS schemes introduce ...","language":"en","urldate":"2016-05-03","booktitle":"Encyclopedia of Multimedia","publisher":"Springer US","editor":[{"propositions":[],"lastnames":["Furht"],"firstnames":["Borko"],"suffixes":[]}],"year":"2008","note":"00000","pages":"277–277","bibtex":"@incollection{furht_halftoning_2008,\n\ttitle = {Halftoning {Based} {Visual} {Secret} {Sharing} ({Vss})},\n\tcopyright = {©2008 Springer-Verlag},\n\tisbn = {978-0-387-74724-8 978-0-387-78414-4},\n\turl = {http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_330},\n\tabstract = {DefinitionIn Visual Secret Sharing based on halftoning, the continuous-tone image is first transformed into a halftone image, and then the VSS is applied.Since VSS-schemes require binary inputs [1, 2], the continuous-tone image is first transformed into a halftone image using the density of the net dots to simulate the intensity levels [3]. In the sequence, the halftone version of the secret image is encrypted into the n shares using the conventional (k, n) visual cryptography based encryption process. The secret image is visually revealed if at least k shares are available for decryption and stacked together on an overhead projector or specialized display.Due to the nature of visual cryptography, and the expansion and contrast properties of (k,n)-VSS schemes, both binary (conventional) and halftoning-based VSS schemes usually produce shares and decrypted images with expanded dimensions compared to those of the original input (secret) image. In addition, VSS schemes introduce ...},\n\tlanguage = {en},\n\turldate = {2016-05-03},\n\tbooktitle = {Encyclopedia of {Multimedia}},\n\tpublisher = {Springer US},\n\teditor = {Furht, Borko},\n\tyear = {2008},\n\tnote = {00000},\n\tpages = {277--277}\n}\n\n","editor_short":["Furht, B."],"key":"furht_halftoning_2008","id":"furht_halftoning_2008","bibbaseid":"furht-halftoningbasedvisualsecretsharingvss-2008","role":"editor","urls":{"Paper":"http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_330"},"downloads":0,"html":""},"bibtype":"incollection","biburl":"http://www.telemidia.puc-rio.br/~alan/files/all.bib","creationDate":"2020-03-03T14:08:14.601Z","downloads":0,"keywords":[],"search_terms":["halftoning","based","visual","secret","sharing","vss"],"title":"Halftoning Based Visual Secret Sharing (Vss)","year":2008,"dataSources":["jAxurbvLP8q5LTdLa"]}