Publication Type : Conference Paper
Publisher : Springer
Source : Advances in Intelligent Systems and Computing ((AISC,volume 683))
Url : https://link.springer.com/chapter/10.1007/978-3-319-68385-0_26
Campus : Coimbatore
Center : TIFAC CORE in Cyber Security
Department : TIFAC-CORE in Cyber Security
Year : 2017
Abstract : In visual cryptography, random shares are generated from a binary secret image whereas in extended visual cryptography, meaningful shares are generated using the scheme. There are lots of constructions in visual cryptography and extended visual cryptography for both general and special access structures. Here in this paper, we are proposing an extended visual cryptographic scheme with improved contrast and less pixel expansion for the special access structures (t, k, n) and where each participant hold single meaningful image as share. The cover images used for creating shares in the proposed schemes are complementary in nature.
Cite this Research Publication : Praveen, K., G. Indhu,M. Sethumadhavan., OR Operation Based Deterministic Extended Visual Cryptography Using Complementary Cover Images, ISTA 2017, Advances in Intelligent Systems and Computing, Springer.