High-quality Visual Cryptography of Real-value Images without Pixel Expansion using Fuzzy Random Grids

سال انتشار: 1402
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 127

فایل این مقاله در 27 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_IJFS-20-6_002

تاریخ نمایه سازی: 18 آذر 1402

چکیده مقاله:

Visual cryptography is a method used to secure images by converting them into several shares that are finally stacked to recover the original image without any calculations. Most existing techniques that can encrypt gray and color images often convert them to binary or support only limited colors, which results in reducing the quality of recovered images. Pixel expansion is another problem with existing methods. Thus, a new approach is required to encrypt gray and color images with real value, without converting them to binary or limited-color images, and also without imposing any pixel expansions. Besides, generated shares should have security, and the recovered images should be of high quality. In this research, fuzzy random grids and a meta-heuristic algorithm are used for the share generation in the encryption step. Next, the decryption step uses the fuzzy OR operator to recover high-quality images. The evaluation results demonstrate the ability of the proposed solution in encrypting gray and color images without converting them to binary, and also without pixel expansion. Besides, the results show that the proposed method is secure as individual shares do not show any information from the original image. The quality of the decrypted images has also been evaluated using subjective and objective evaluation metrics, which prove the high quality of recovered images.

نویسندگان

Mostafa Mokhtari Ardakan

Department of Computer Engineering, University of Isfahan, Isfahan, Iran.

Reza Ramezani

Department of Computer Engineering, University of Isfahan, Isfahan, Iran.

Ali Mohammad Latif

Department of Computer Engineering, Yazd University, Yazd, Iran.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • F. M. Aswad, I. Salman, S. A. Mostafa, An optimization ...
  • H. Ayad, M. Khalil, Qam-dwt-svd based watermarking scheme for medical ...
  • C. S. Baird, Absorption of electromagnetic radiation, AccessScience, ۲۰۱۹ ...
  • J. Blesswin, M. Kumar, Secured communication method using visual secret ...
  • C. Blundo, S. Cimato, A. De Santis, Visual cryptography schemes ...
  • N. Buckley, A. K. Nagar, S. Arumugam, On real-valued visual ...
  • B. Champagne, M. Guillaume, F. Zutterman, TDDFT investigation of the ...
  • J. Chandrasekaran, Chemistry of colours, Resonance, ۶(۳) (۲۰۰۱), ۶۶-۷۵ ...
  • J. J. Chang, B. Y. Huang, J. S. Juan, A ...
  • H. C. Chao, T. Y. Fan, Random-grid based progressive visual ...
  • H. C. Chao, T. Y. Fan, XOR-based progressive visual secret ...
  • H. C. Chao, T. Y. Fan, Generating random grid-based visual ...
  • T. H. Chen, Y. S. Lee, C. H. Lin, On ...
  • P. L. Chiu, K. H. Lee, Ecient constructions for progressive ...
  • S. Cimato, R. De Prisco, A. De Santis, Probabilistic visual ...
  • S. Cimato, R. De Prisco, A. De Santis, Colored visual ...
  • M. A. Duraisamy, M. M. Sathiyamoorthy, M. S. Chandrasekar, Protection ...
  • P. A. Eisen, D. R. Stinson, Threshold visual cryptography schemes ...
  • R. Franzen, Kodak lossless true color image suite, http : ...
  • A. Giri, Development of digital half toning techniques for Grayscale ...
  • M. Gupta, et al., An ecient image encryption technique based ...
  • C. Hegde, et al., Secure authentication using image processing and ...
  • A. Hore, D. Ziou, Image quality metrics: PSNR vs. SSIM, ...
  • Y. C. Hou, Visual cryptography for color images, Pattern Recognition, ...
  • H. Hu, et al., General construction for XOR-based visual cryptography ...
  • B. Hu, et al., Subjective and objective quality assessment for ...
  • O. Kafri, E. Keren, Encryption of pictures and shapes by ...
  • Y. Kang, et al., Visual cryptography based on ghost imaging ...
  • S. Kumar, R. Sharma, Improving contrast in random grids based ...
  • P. Li, et al., A construction method of (۲, ۳) ...
  • C. C. Lin, W. H. Tsai, Visual cryptography for gray-level ...
  • Z. Liu, et al., Weighted visual secret sharing for general ...
  • N. A. E. S. Mohamed, A. Youssif, H. A. G. ...
  • P. Mohammadi, A. Ebrahimi Moghadam, S. Shirani, Subjective and objective ...
  • M. Naor, A. Shamir, Visual cryptography, Advances in Cryptology{EUROCRYPT'۹۴: Workshop ...
  • J. S. Pan, et al., Visual cryptography scheme for secret ...
  • C. S. Sanaboina, S. R. Odugu, G. Vanamadi, Secret image ...
  • U. Sara, M. Akter, M. S. Uddin, Image quality assessment ...
  • D. R. I. M. Setiadi, PSNR vs SSIM: Imperceptibility quality ...
  • G. Shen, et al., Perfect contrast XOR-based visual cryptography schemes ...
  • H. Shi, et al., A robust and secure zero-watermarking copyright ...
  • S. J. Shyu, Image encryption by random grids, Pattern Recognition, ...
  • S. J. Shyu, Image encryption by multiple random grids, Pattern ...
  • S. J. Shyu, M. C. Chen, Minimizing pixel expansion in ...
  • P. Singh, B. Raman, Reversible data hiding based on Shamir's ...
  • USC University of Southern California. The USC-SIPI Image Database. url: ...
  • Z. Wang, et al., Image quality assessment: From error visibility ...
  • Z. Wang, G. R. Arce, G. Di Crescenzo, Halftone visual ...
  • D. S. Wang, et al., Optimal contrast grayscale visual cryptography ...
  • D. S. Wang, F. Yi, X. Li, Probabilistic visual secret ...
  • G. Wei, Some similarity measures for picture fuzzy sets and ...
  • X. Wu, Z. R. Lai, Random grid based color visual ...
  • X. Wu, W. Sun, Improving the visual quality of random ...
  • X. Wu, W. Sun, Extended capabilities for XOR-based visual cryptography, ...
  • X. Wu, C. N. Yang, Invertible secret image sharing with ...
  • X. Wu, C. N. Yang, Probabilistic color visual cryptography schemes ...
  • C. N. Yang, New visual secret sharing schemes using probabilistic ...
  • C. N. Yang, T. S. Chen, Aspect ratio invariant visual ...
  • C. N. Yang, C. C. Wang, T. S. Chen, Visual ...
  • C. N. Yang, Y. Y. Yang, On the analysis and ...
  • L. A. Zadeh, Fuzzy sets, Information and Control, ۸(۳) (۱۹۶۵), ...
  • D. Zhang, et al., HP-VCS: A high-quality and printer-friendly visual ...
  • نمایش کامل مراجع