Skip to main content

2019 | OriginalPaper | Buchkapitel

Optimal Thresholding in Direct Binary Search Visual Cryptography for Enhanced Bank Locker System

verfasst von : Sandhya Anne Thomas, Saylee Gharge

Erschienen in: Emerging Research in Computing, Information, Communication and Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Visual cryptography (VC) is one of the strongest cryptographic method present. The main advantage of this system is that the decryption doesnot need any specific requirements for decoding other than human eyes. Using halftoning techniques binary images are obtained for grayscale and color images, this technique is applied in Halftone VC. In this paper, direct binary search (DBS) is implemented and initial images are modified for better quality of recovered images. The concept is proposed for bank locker systems. Comparison has been made using parameters like PSNR, Correlation, UQI and SSIM.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Naor, M., & Shamir, A. (1994). Visual cryptography. In Proceeding EUROCRYPT (pp. 1–12). Naor, M., & Shamir, A. (1994). Visual cryptography. In Proceeding EUROCRYPT (pp. 1–12).
2.
Zurück zum Zitat Thomas, S. A., & Gharge, S. (2017). Review on various visual cryptography schemes. In 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC) (pp. 1164–1167). Mysore. Thomas, S. A., & Gharge, S. (2017). Review on various visual cryptography schemes. In 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC) (pp. 1164–1167). Mysore.
3.
Zurück zum Zitat Blundo, C., DArco, P., De Santis, A., & Stinson, D. R. (2003). Contrast optimal threshold visual cryptography schemes. SIAM Journal on Discrete Mathematics, 16, 224–261. Blundo, C., DArco, P., De Santis, A., & Stinson, D. R. (2003). Contrast optimal threshold visual cryptography schemes. SIAM Journal on Discrete Mathematics, 16, 224–261.
4.
Zurück zum Zitat Ateniese, G., Blundo, C., Santis, A. D., & Stinson, D. R. (1996). Visual cryptography for general access structures. Information and Computation, 129, 86–106. Ateniese, G., Blundo, C., Santis, A. D., & Stinson, D. R. (1996). Visual cryptography for general access structures. Information and Computation, 129, 86–106.
5.
Zurück zum Zitat Blundo, C., Santis, A. D., & Naor, M. (2000). Visual cryptography for grey level images. Information Processing Letters, 75, 255–259.MathSciNetCrossRef Blundo, C., Santis, A. D., & Naor, M. (2000). Visual cryptography for grey level images. Information Processing Letters, 75, 255–259.MathSciNetCrossRef
6.
Zurück zum Zitat Hou, Y. C. (2003). Visual cryptography for color images. Pattern Recognition, 36, 1619–1629.CrossRef Hou, Y. C. (2003). Visual cryptography for color images. Pattern Recognition, 36, 1619–1629.CrossRef
7.
Zurück zum Zitat Ateniese, G., Blundo, C., Santis, A., & Stinson, D. R. (2001). Extended capabilities for visual cryptography. Theoretical Computer Science, 250, 143–161.MathSciNetCrossRef Ateniese, G., Blundo, C., Santis, A., & Stinson, D. R. (2001). Extended capabilities for visual cryptography. Theoretical Computer Science, 250, 143–161.MathSciNetCrossRef
8.
Zurück zum Zitat Zhou, Z., Arce, G. R., & Crescenzo, G. D. (2006). Halftone visual cryptography. IEEE Transactions on Image Processing, 18, 2441–2453.CrossRef Zhou, Z., Arce, G. R., & Crescenzo, G. D. (2006). Halftone visual cryptography. IEEE Transactions on Image Processing, 18, 2441–2453.CrossRef
9.
Zurück zum Zitat Thomas, S. A., & Gharge, S. (2018). Halftone visual cryptography for grayscale images using error diffusion and direct binary search, in 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 1091–1096). Tirunelveli, India. Thomas, S. A., & Gharge, S. (2018). Halftone visual cryptography for grayscale images using error diffusion and direct binary search, in 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 1091–1096). Tirunelveli, India.
10.
Zurück zum Zitat Kang, I., Arce, G. R., & Lee, H.-K. (2011). Color extended visual cryptography using error diffusion. IEEE Transactions on Image Processing, 20. Kang, I., Arce, G. R., & Lee, H.-K. (2011). Color extended visual cryptography using error diffusion. IEEE Transactions on Image Processing, 20.
11.
Zurück zum Zitat Wang, Z. M., Arce, G. R., & Di Crescenzo, G. (2006). Halftone visual cryptography via direct binary search. EUSIPCO. Wang, Z. M., Arce, G. R., & Di Crescenzo, G. (2006). Halftone visual cryptography via direct binary search. EUSIPCO.
12.
Zurück zum Zitat Otsu, N. (1979). A threshold selection method from gray-level histograms. IEEE Transactions on Systems, Man, and Cybernetics, 9(1), 62–66.CrossRef Otsu, N. (1979). A threshold selection method from gray-level histograms. IEEE Transactions on Systems, Man, and Cybernetics, 9(1), 62–66.CrossRef
13.
Zurück zum Zitat Thomas, S. A., & Gharge, S. (2018). Enhanced security for military grid reference system using visual cryptography, in 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (pp. 1–7). Bangalore. Thomas, S. A., & Gharge, S. (2018). Enhanced security for military grid reference system using visual cryptography, in 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (pp. 1–7). Bangalore.
14.
Zurück zum Zitat Wang, Z., & Bovik, A. C. (2002). A universal image quality index. IEEE Signal Processing Letters, 9. Wang, Z., & Bovik, A. C. (2002). A universal image quality index. IEEE Signal Processing Letters, 9.
15.
Zurück zum Zitat Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing, 13. Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing, 13.
Metadaten
Titel
Optimal Thresholding in Direct Binary Search Visual Cryptography for Enhanced Bank Locker System
verfasst von
Sandhya Anne Thomas
Saylee Gharge
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-6001-5_49

Neuer Inhalt