Lossless sharing visual cryptography

According to the information loss during the secret image sharing process, the lossless sharing visual crypto-graphy was proposed. The optimizations of two parameters were simplified into one parameter. The matrices translation algorithm and the integer programming model were designed. Furthermore,...

Full description

Saved in:
Bibliographic Details
Main Authors: Bin YU, Zheng-xin FU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2013-03-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.03.021/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539852380667904
author Bin YU
Zheng-xin FU
author_facet Bin YU
Zheng-xin FU
author_sort Bin YU
collection DOAJ
description According to the information loss during the secret image sharing process, the lossless sharing visual crypto-graphy was proposed. The optimizations of two parameters were simplified into one parameter. The matrices translation algorithm and the integer programming model were designed. Furthermore, the pixel expansion optimization algorithm was realized. The experimental results show that the algorithm achieves the optimal pixel expansion under lossless shar-ing, and can be used in general access structure.
format Article
id doaj-art-f2f10dabe6bb425dbb7f8ab220e9e96e
institution Kabale University
issn 1000-436X
language zho
publishDate 2013-03-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-f2f10dabe6bb425dbb7f8ab220e9e96e2025-01-14T06:34:54ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-03-013416517059671100Lossless sharing visual cryptographyBin YUZheng-xin FUAccording to the information loss during the secret image sharing process, the lossless sharing visual crypto-graphy was proposed. The optimizations of two parameters were simplified into one parameter. The matrices translation algorithm and the integer programming model were designed. Furthermore, the pixel expansion optimization algorithm was realized. The experimental results show that the algorithm achieves the optimal pixel expansion under lossless shar-ing, and can be used in general access structure.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.03.021/isual cryptographylossless sharingpixel expansionoptimization algorithm
spellingShingle Bin YU
Zheng-xin FU
Lossless sharing visual cryptography
Tongxin xuebao
isual cryptography
lossless sharing
pixel expansion
optimization algorithm
title Lossless sharing visual cryptography
title_full Lossless sharing visual cryptography
title_fullStr Lossless sharing visual cryptography
title_full_unstemmed Lossless sharing visual cryptography
title_short Lossless sharing visual cryptography
title_sort lossless sharing visual cryptography
topic isual cryptography
lossless sharing
pixel expansion
optimization algorithm
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.03.021/
work_keys_str_mv AT binyu losslesssharingvisualcryptography
AT zhengxinfu losslesssharingvisualcryptography