Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chang, C.C. and Chuang, J.C. (2002): An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recognition Letters, 23, 931-941
Hwang, K.F. and Chang, C.C. (2004): Recent development of visual cryptography. Intelligent Watermarking Techniques, World Scientific Publishing Company, Chapter 16, 459-480
Blakley, G.R. (1979), Safeguarding cryptographic keys. Proceedings of the National Computer Conference, New York, 48, 313-317
Naor, N. and Shamir, A. (1995): Visual cryptography. Advances in CryptologyEurocrypt’94, Lecture Notes in Computer Science, Springer-Verlag, 950, 1-12
Wu, H.C. and Chang, C.C. (2005): Sharing visual multi-secrets using circle shares. Computer Standards & Interfaces, 28, 123-135
Lin, C.C. and Tsai, W.H. (2003): Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters, 24, 349-358
Blundo, C., Bonis, A.D. and Santis, A.D. (2001): Improved schemes for visual cryptography. Designs, Codes, and Cryptography, 24, 255-278
. Viet, D.Q. and Kurosawa, K. (2004): Almost ideal contrast visual cryptography with reversing. Visual Cryptography II: Improving the Contrast Via the Cover Base, Lecture Notes in Computer Science, Springer-Verlag, 2964, 353-365
Verheul, E.R. and Tilborg, H.C.A. (1997): Constructions and properties of k out of n visual secret sharing schemes. Designs, Codes, and Cryptography, 11, 179-196
Lukac, R. and Plataniotis, K.N. (2005): Bit-level based Secret sharing for image encryption. Pattern Recognition, 38, 767-772
Droste, S. (1996): New Results on visual cryptography. Advances in CryptologyEurocrypt’96, Lecture Notes in Computer Science, Springer-Verlag, 1109, 401-415
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Chang, CC., Lu, TC., Fan, YH. (2007). A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operatations. In: Pan, JS., Huang, HC., Jain, L.C., Fang, WC. (eds) Intelligent Multimedia Data Hiding. Studies in Computational Intelligence, vol 58. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71169-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-71169-8_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71168-1
Online ISBN: 978-3-540-71169-8
eBook Packages: EngineeringEngineering (R0)