{"title":"彩色图像的半色调视觉密码术","authors":"Shivani Pahuja, Singara Singh Kasana","doi":"10.1109/COMPTELIX.2017.8003979","DOIUrl":null,"url":null,"abstract":"Visual cryptographic schemes (VCS) allow one(at the sender side) to encrypt a secret picture (image) into different share images. Here no share image does uncovers any knowledge concerning to the original secret image. This work proposes visual cryptography encryption framework by using an algorithm developed by Floyd and Steinberg's for error diffusion for grayscale as well as color images. Floyd Steinberg diffusion technique continuously delivers(generates) delighting colored halftoned images for our natural vision system of humans. A color image to be protected is taken as input and then this image is decomposed into three separate monochromatic images based on CMY color space. The computer simulation demonstrates that the visual nature and tone (in terms of quality) of the acquired halftoned shares is acceptable.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"13 1","pages":"281-285"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Halftone visual cryptography for color images\",\"authors\":\"Shivani Pahuja, Singara Singh Kasana\",\"doi\":\"10.1109/COMPTELIX.2017.8003979\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Visual cryptographic schemes (VCS) allow one(at the sender side) to encrypt a secret picture (image) into different share images. Here no share image does uncovers any knowledge concerning to the original secret image. This work proposes visual cryptography encryption framework by using an algorithm developed by Floyd and Steinberg's for error diffusion for grayscale as well as color images. Floyd Steinberg diffusion technique continuously delivers(generates) delighting colored halftoned images for our natural vision system of humans. A color image to be protected is taken as input and then this image is decomposed into three separate monochromatic images based on CMY color space. The computer simulation demonstrates that the visual nature and tone (in terms of quality) of the acquired halftoned shares is acceptable.\",\"PeriodicalId\":6917,\"journal\":{\"name\":\"2017 International Conference on Computer, Communications and Electronics (Comptelix)\",\"volume\":\"13 1\",\"pages\":\"281-285\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Computer, Communications and Electronics (Comptelix)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPTELIX.2017.8003979\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPTELIX.2017.8003979","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Visual cryptographic schemes (VCS) allow one(at the sender side) to encrypt a secret picture (image) into different share images. Here no share image does uncovers any knowledge concerning to the original secret image. This work proposes visual cryptography encryption framework by using an algorithm developed by Floyd and Steinberg's for error diffusion for grayscale as well as color images. Floyd Steinberg diffusion technique continuously delivers(generates) delighting colored halftoned images for our natural vision system of humans. A color image to be protected is taken as input and then this image is decomposed into three separate monochromatic images based on CMY color space. The computer simulation demonstrates that the visual nature and tone (in terms of quality) of the acquired halftoned shares is acceptable.