Title :
Non-expanded visual cryptography scheme with authentication
Author :
Yi-Jing Huang ; Jun-Dong Chang
Author_Institution :
Dept. of Comput. Sci. & Inf. Eng., Nat. Taiwan Univ., Taipei, Taiwan
Abstract :
In recent years, a crucial issue is the manner in which to safely transmit the secret information and prevent the detection of information. An extended visual cryptography with authentication technology for the original image was proposed in previous studies. Fang and Lin´s scheme [3] combine the principle of traditional visual cryptography with authentication characteristic, when we fix the first share image and shift the other share image for certain unit, we can obtain the extra confidential data. But in traditional visual cryptography, secret pixels are expanded to cause the size of the recovered image is larger than the original one. So this study combined the non-expanded scheme with the extra ability of hiding confidential data to prevent the detection of information.
Keywords :
cryptography; data encapsulation; data privacy; image coding; authentication characteristic; authentication technology; confidential data hiding; extended visual cryptography; extra confidential data; image recovery; information detection prevention; nonexpanded visual cryptography scheme; original image; safe secret information transmission; secret pixels; share image; Authentication; Cryptography; Encoding; Image coding; Image color analysis; Stacking; Visualization;
Conference_Titel :
Next-Generation Electronics (ISNE), 2013 IEEE International Symposium on
Conference_Location :
Kaohsiung
Print_ISBN :
978-1-4673-3036-7
DOI :
10.1109/ISNE.2013.6512319