{"title":"视觉密码中半色调图像的有效恢复技术","authors":"John Blesswin, V Rema, J. Joselin","doi":"10.1109/RSTSCC.2010.5712808","DOIUrl":null,"url":null,"abstract":"Security has become an inseparable issue even in the field of space technology. Visual Cryptography is the study of mathematical techniques related aspects of Information Security which allows Visual information to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique represents the secret image by several different shares of binary images. It is hard to perceive any clues about a secret image from individual shares. The secret message is revealed when parts or all of these shares are aligned and stacked together. In this paper we provide an overview of the emerging Visual Cryptography (VC) techniques used in the secure transfer of the thousands of images collected by the satellite which are stored in image library and sent to Google for use on Google Earth and Google maps. The related work is based on the recovering of secret image using a binary logo which is used to represent the ownership of the host image which generate shadows by visual cryptography algorithms. An error correction-coding scheme is also used to create the appropriate shadow. The logo extracted from the half-toned host image identifies the cheating types. Furthermore, the logo recovers the reconstructed image when shadow is being cheated using an image self-verification scheme based on the Rehash technique which rehash the halftone logo for effective self verification of the reconstructed secret image without the need for the trusted third party(TTP).","PeriodicalId":254761,"journal":{"name":"Recent Advances in Space Technology Services and Climate Change 2010 (RSTS & CC-2010)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Effective recovery technique for halftone images in Visual Cryptography\",\"authors\":\"John Blesswin, V Rema, J. Joselin\",\"doi\":\"10.1109/RSTSCC.2010.5712808\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security has become an inseparable issue even in the field of space technology. Visual Cryptography is the study of mathematical techniques related aspects of Information Security which allows Visual information to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique represents the secret image by several different shares of binary images. It is hard to perceive any clues about a secret image from individual shares. The secret message is revealed when parts or all of these shares are aligned and stacked together. In this paper we provide an overview of the emerging Visual Cryptography (VC) techniques used in the secure transfer of the thousands of images collected by the satellite which are stored in image library and sent to Google for use on Google Earth and Google maps. The related work is based on the recovering of secret image using a binary logo which is used to represent the ownership of the host image which generate shadows by visual cryptography algorithms. An error correction-coding scheme is also used to create the appropriate shadow. The logo extracted from the half-toned host image identifies the cheating types. Furthermore, the logo recovers the reconstructed image when shadow is being cheated using an image self-verification scheme based on the Rehash technique which rehash the halftone logo for effective self verification of the reconstructed secret image without the need for the trusted third party(TTP).\",\"PeriodicalId\":254761,\"journal\":{\"name\":\"Recent Advances in Space Technology Services and Climate Change 2010 (RSTS & CC-2010)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Recent Advances in Space Technology Services and Climate Change 2010 (RSTS & CC-2010)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RSTSCC.2010.5712808\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Recent Advances in Space Technology Services and Climate Change 2010 (RSTS & CC-2010)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RSTSCC.2010.5712808","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Effective recovery technique for halftone images in Visual Cryptography
Security has become an inseparable issue even in the field of space technology. Visual Cryptography is the study of mathematical techniques related aspects of Information Security which allows Visual information to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique represents the secret image by several different shares of binary images. It is hard to perceive any clues about a secret image from individual shares. The secret message is revealed when parts or all of these shares are aligned and stacked together. In this paper we provide an overview of the emerging Visual Cryptography (VC) techniques used in the secure transfer of the thousands of images collected by the satellite which are stored in image library and sent to Google for use on Google Earth and Google maps. The related work is based on the recovering of secret image using a binary logo which is used to represent the ownership of the host image which generate shadows by visual cryptography algorithms. An error correction-coding scheme is also used to create the appropriate shadow. The logo extracted from the half-toned host image identifies the cheating types. Furthermore, the logo recovers the reconstructed image when shadow is being cheated using an image self-verification scheme based on the Rehash technique which rehash the halftone logo for effective self verification of the reconstructed secret image without the need for the trusted third party(TTP).