{"title":"基于异或函数的可视化密码系统综述","authors":"Asmaa Hilmi, Soufiane Mezroui, A. Oualkadi","doi":"10.1109/ICMCS.2018.8525879","DOIUrl":null,"url":null,"abstract":"Visual cryptography based on XOR is a science that gives solutions of several problems in relation with the security. From now on it is often used in the daily applications in relation with the computer field. Among the application cited in this article; print and scan, which used the WALSH transformation, there is also the color image application, which used the HALFTONE technique to print the image according to the model CMY. To succeed in removing the secret correctly from the recovered image; two criteria are taken into account: minimization of the pixel expansion and maximization of the contrast.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"360 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Overview of Visual Cryptographic Systems Based on XOR Function\",\"authors\":\"Asmaa Hilmi, Soufiane Mezroui, A. Oualkadi\",\"doi\":\"10.1109/ICMCS.2018.8525879\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Visual cryptography based on XOR is a science that gives solutions of several problems in relation with the security. From now on it is often used in the daily applications in relation with the computer field. Among the application cited in this article; print and scan, which used the WALSH transformation, there is also the color image application, which used the HALFTONE technique to print the image according to the model CMY. To succeed in removing the secret correctly from the recovered image; two criteria are taken into account: minimization of the pixel expansion and maximization of the contrast.\",\"PeriodicalId\":272255,\"journal\":{\"name\":\"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)\",\"volume\":\"360 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMCS.2018.8525879\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMCS.2018.8525879","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Overview of Visual Cryptographic Systems Based on XOR Function
Visual cryptography based on XOR is a science that gives solutions of several problems in relation with the security. From now on it is often used in the daily applications in relation with the computer field. Among the application cited in this article; print and scan, which used the WALSH transformation, there is also the color image application, which used the HALFTONE technique to print the image according to the model CMY. To succeed in removing the secret correctly from the recovered image; two criteria are taken into account: minimization of the pixel expansion and maximization of the contrast.