Improved visual secret sharing scheme for QR code applications

Y Cheng, Z Fu, B Yu - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Quick response (QR) codes have been widely used in applications, such as data storage
and high-speed machine reading. Anyone can gain access to the information stored in QR …

Enhanced Boolean-based multi secret image sharing scheme

CN Yang, CH Chen, SR Cai - Journal of Systems and software, 2016 - Elsevier
Abstract Recently, Chen and Wu propose a (n, n) multi secret image sharing (MSIS) scheme
that shares n secret images into n shared images. These n shared images can be together …

Probabilistic color visual cryptography schemes for black and white secret images

X Wu, CN Yang - Journal of Visual Communication and Image …, 2020 - Elsevier
Color-black-and-white visual cryptography scheme (CBW-VCS) is a methodology that
utilizes colors to alleviate the pixel expansion problem. In a general (k, n) CBW-VCS, when k …

Parabit: processing parallel bitwise operations in nand flash memory based ssds

C Gao, X **n, Y Lu, Y Zhang, J Yang… - MICRO-54: 54th Annual …, 2021 - dl.acm.org
Processing-in-memory (PIM) and in-storage-computing (ISC) architectures have been
constructed to implement computation inside memory and near storage, respectively. While …

Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality

X Yan, S Wang, X Niu, CN Yang - Digital Signal Processing, 2015 - Elsevier
In halftone visual cryptography scheme (HVCS), a secret image can be embedded into
halftone shares with meaningful information of the cover images. Meaningful shares are …

Extended capabilities for XOR-based visual cryptography

X Wu, W Sun - IEEE Transactions on Information Forensics and …, 2014 - ieeexplore.ieee.org
The XOR-based visual cryptography (VC) is a possible methodology to solve the poor visual
quality problem without darkening the background in VC. However, investigations on XOR …

Collaborative visual cryptography schemes

X Jia, D Wang, D Nie, C Zhang - IEEE Transactions on Circuits …, 2016 - ieeexplore.ieee.org
A (k, n)-conventional visual cryptography (VC) scheme is designed to share one secret and
each participant takes one share. When some common participants are involved in multiple …

Combination of Sharing Matrix and Image Encryption for Lossless -Secret Image Sharing

L Bao, S Yi, Y Zhou - IEEE Transactions on Image Processing, 2017 - ieeexplore.ieee.org
This paper first introduces a (k, n)-sharing matrix S (k, n) and its generation algorithm.
Mathematical analysis is provided to show its potential for secret image sharing. Combining …

Perfect contrast XOR-based visual cryptography schemes via linear algebra

G Shen, F Liu, Z Fu, B Yu - Designs, Codes and Cryptography, 2017 - Springer
XOR-based visual cryptography scheme (XVCS) was proposed to solve the poor visual
quality problem without darkening the background in the reconstructed secret image …

Efficient constructions for progressive visual cryptography with meaningful shares

PL Chiu, KH Lee - Signal Processing, 2019 - Elsevier
In a progressive visual cryptography scheme (PVCS), the clarity of recovered images can be
enhanced by increasing the number of stacking shares. Noise-like shares are hard to …