Javascript must be enabled to continue!
Lossless Recovery Scheme for Grayscale Visual Cryptography Based on Random Grids
View through CrossRef
With the advancement of digitalization, the demand for grayscale image encryption has been increasing. Previous visual cryptography schemes for grayscale images have encountered issues such as information loss during recovery, poor recovery quality, and significant pixel expansion. This study introduces novel grayscale visual cryptography schemes based on grayscale threshold segmentation, including the (n,n) and (k,n) schemes, utilizing random grids. These schemes enable lossless recovery of the secret image when all shares are involved in the decryption process. Furthermore, by incorporating the particle swarm optimization algorithm, a scheme for generating share images containing grayscale information was proposed. This method relies on the grayscale-overlay principle, allowing secret image recovery through the overlay of shares without requiring computational devices, demonstrating the applicability of the extended scheme. Theoretical analysis demonstrates the security of the proposed schemes, and experimental results further verify their effectiveness.
Title: Lossless Recovery Scheme for Grayscale Visual Cryptography Based on Random Grids
Description:
With the advancement of digitalization, the demand for grayscale image encryption has been increasing.
Previous visual cryptography schemes for grayscale images have encountered issues such as information loss during recovery, poor recovery quality, and significant pixel expansion.
This study introduces novel grayscale visual cryptography schemes based on grayscale threshold segmentation, including the (n,n) and (k,n) schemes, utilizing random grids.
These schemes enable lossless recovery of the secret image when all shares are involved in the decryption process.
Furthermore, by incorporating the particle swarm optimization algorithm, a scheme for generating share images containing grayscale information was proposed.
This method relies on the grayscale-overlay principle, allowing secret image recovery through the overlay of shares without requiring computational devices, demonstrating the applicability of the extended scheme.
Theoretical analysis demonstrates the security of the proposed schemes, and experimental results further verify their effectiveness.
Related Results
Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A.
Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A.
With the growing interest in cryptography --- from students and
researchers as well as from the general public --- there has been a
corresponding increase in the number of cryptogr...
Current therapeutic strategies for erectile function recovery after radical prostatectomy – literature review and meta-analysis
Current therapeutic strategies for erectile function recovery after radical prostatectomy – literature review and meta-analysis
Radical prostatectomy is the most commonly performed treatment option for localised prostate cancer. In the last decades the surgical technique has been improved and modified in or...
Lossless plasmons in highly mismatched alloys
Lossless plasmons in highly mismatched alloys
We explore the potential of highly mismatched alloys (HMAs) for realizing lossless plasmonics. Systems with a plasmon frequency at which there are no interband or intraband process...
Changes in soil quality on horse paddock trails and the influence of paddock grids
Changes in soil quality on horse paddock trails and the influence of paddock grids
AbstractPaddock trails offer horses the possibility to follow their natural urge to move and to behave interactively in a group association. To create appropriate conditions all ye...
Echogenicity unit: A mathematical formula based on grayscale imagery
Echogenicity unit: A mathematical formula based on grayscale imagery
Abstract
Ultrasonography is a non-invasive imaging technique widely used in medical practice for diagnostic purposes. One crucial aspect of ultrasound imaging is the interp...
A Survey about Post Quantum Cryptography Methods
A Survey about Post Quantum Cryptography Methods
Cryptography is an art of hiding the significant data or information with some other codes. It is a practice and study of securing information and communication. Thus, cryptography...
Active Versus Passive Recovery During High Intensity Intermittent Treadmill Running in Collegiate Sprinters
Active Versus Passive Recovery During High Intensity Intermittent Treadmill Running in Collegiate Sprinters
Most studies on manipulating recovery variables during interval exercise have focused primarily on aerobic training and performances. It was the purpose of this study to investigat...
The Application of 3-Dimensional Measurement and Grayscale Value Measurement Techniques in Lower Eyelid Blepharoplasty
The Application of 3-Dimensional Measurement and Grayscale Value Measurement Techniques in Lower Eyelid Blepharoplasty
Abstract
Background
Lower eyelid blepharoplasty addresses under-eye bags and tear troughs, but traditional evaluations lack obje...

