Random grid-based visual secret sharing for general access structures with cheat-preventing ability
► We propose a RG-based VSS for general access structures. ► Pixel expansion problem is solve in the proposed scheme. ► Complex sharing strategy can be realized by the proposed scheme. ► A cheating immune method is proposed to prevent VSS from being cheated. Conventional visual secret sharing (VSS)...
Saved in:
| Published in | The Journal of systems and software Vol. 85; no. 5; pp. 1119 - 1134 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
New York
Elsevier Inc
01.05.2012
Elsevier Sequoia S.A |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0164-1212 1873-1228 |
| DOI | 10.1016/j.jss.2011.12.041 |
Cover
| Abstract | ► We propose a RG-based VSS for general access structures. ► Pixel expansion problem is solve in the proposed scheme. ► Complex sharing strategy can be realized by the proposed scheme. ► A cheating immune method is proposed to prevent VSS from being cheated.
Conventional visual secret sharing (VSS) encodes a secret image into shares which are m times as big as the secrets. m is called pixel expansion. Random grid (RG) is an approach to solve pixel expansion problem. However, the existing VSS methods using RGs are confined to (2,n),(n,n) and (k,n). In this paper, RG-based VSS schemes for general access structures are proposed. The proposed algorithms can encode one secret image into n random grids while qualified sets can recover the secret visually. Furthermore, a cheating immune method is also presented to provided extra ability of cheat-preventing for RG-based VSS. Experimental results demonstrate that both the RG-based VSS for general access structures and cheating immune method are effective. More complicated sharing strategies can be implemented. |
|---|---|
| AbstractList | Conventional visual secret sharing (VSS) encodes a secret image into shares which are m times as big as the secrets. m is called pixel expansion. Random grid (RG) is an approach to solve pixel expansion problem. However, the existing VSS methods using RGs are confined to (2,n),(n,n) and (k,n). In this paper, RG-based VSS schemes for general access structures are proposed. The proposed algorithms can encode one secret image into n random grids while qualified sets can recover the secret visually. Furthermore, a cheating immune method is also presented to provided extra ability of cheat-preventing for RG-based VSS. Experimental results demonstrate that both the RG-based VSS for general access structures and cheating immune method are effective. More complicated sharing strategies can be implemented. Conventional visual secret sharing (VSS) encodes a secret image into shares which are m times as big as the secrets. m is called pixel expansion. Random grid (RG) is an approach to solve pixel expansion problem. However, the existing VSS methods using RGs are confined to (2,n),(n,n) and (k,n). In this paper, RG-based VSS schemes for general access structures are proposed. The proposed algorithms can encode one secret image into n random grids while qualified sets can recover the secret visually. Furthermore, a cheating immune method is also presented to provided extra ability of cheat-preventing for RG-based VSS. Experimental results demonstrate that both the RG-based VSS for general access structures and cheating immune method are effective. More complicated sharing strategies can be implemented. [PUBLICATION ABSTRACT] ► We propose a RG-based VSS for general access structures. ► Pixel expansion problem is solve in the proposed scheme. ► Complex sharing strategy can be realized by the proposed scheme. ► A cheating immune method is proposed to prevent VSS from being cheated. Conventional visual secret sharing (VSS) encodes a secret image into shares which are m times as big as the secrets. m is called pixel expansion. Random grid (RG) is an approach to solve pixel expansion problem. However, the existing VSS methods using RGs are confined to (2,n),(n,n) and (k,n). In this paper, RG-based VSS schemes for general access structures are proposed. The proposed algorithms can encode one secret image into n random grids while qualified sets can recover the secret visually. Furthermore, a cheating immune method is also presented to provided extra ability of cheat-preventing for RG-based VSS. Experimental results demonstrate that both the RG-based VSS for general access structures and cheating immune method are effective. More complicated sharing strategies can be implemented. |
| Author | Sun, Wei Wu, Xiaotian |
| Author_xml | – sequence: 1 givenname: Xiaotian surname: Wu fullname: Wu, Xiaotian email: wxt.sysu@gmail.com, wuxiaotian_sysu@yahoo.cn organization: School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510006, China – sequence: 2 givenname: Wei surname: Sun fullname: Sun, Wei organization: School of Software, Sun Yat-sen University, Guangzhou 510006, China |
| BookMark | eNp9kE1r3DAQQEVJoZs0PyA30VMvdiVZXtn0VEK_IFAozVnI4_GujFfaauQt-ffRsj3lkJMG9N4wvGt2FWJAxu6kqKWQ209zPRPVSkhZS1ULLd-wjexMU0mluiu2KYwus1Tv2DXRLIQwSqgNg98ujPHAd8mP1eAIR37ytLqFE0LCzGnvkg87PsXEdxgwlS8HgEScclohrwmJ__N5z2GPLlfHhCcM-ey4wS8-P71nbye3EN7-f2_Y47evf-5_VA-_vv-8__JQQdOaXLltKwxqRAl9P7V6GLTRDtXW9I3TGjrVKA1tOzagwEk9Ya9Nj63SWg7tODY37ONl7zHFvytStgdPgMviAsaVrBSlRSdE1xf0wwt0jmsK5Trbq9Zse6V0gcwFghSJEk4WfHbZx5CT80vZZ8_t7WxLe3tub6WypX0x5QvzmPzBpadXnc8XB0uik8dkCTwGwNEnhGzH6F-xnwGZb59P |
| CODEN | JSSODM |
| CitedBy_id | crossref_primary_10_1007_s11042_018_6738_2 crossref_primary_10_1016_j_jvcir_2019_02_008 crossref_primary_10_1016_j_jisa_2017_01_001 crossref_primary_10_4018_IJDCF_2018070104 crossref_primary_10_32604_jnm_2023_039962 crossref_primary_10_1002_sec_769 crossref_primary_10_1007_s13369_016_2124_4 crossref_primary_10_1109_TIP_2023_3263101 crossref_primary_10_1016_j_jss_2013_03_062 crossref_primary_10_1016_j_image_2019_03_017 crossref_primary_10_1080_19393555_2019_1567872 crossref_primary_10_1007_s44230_023_00056_w crossref_primary_10_1007_s11042_018_6478_3 crossref_primary_10_1016_j_sigpro_2013_06_003 crossref_primary_10_4236_jis_2015_64027 crossref_primary_10_1007_s11042_020_10352_3 crossref_primary_10_1109_TIFS_2013_2274955 crossref_primary_10_1007_s11042_019_07807_7 crossref_primary_10_1016_j_sigpro_2013_10_023 crossref_primary_10_1016_j_procs_2015_02_077 crossref_primary_10_1016_j_image_2019_08_007 crossref_primary_10_1016_j_jvcir_2020_102793 crossref_primary_10_1007_s00542_016_3104_z crossref_primary_10_1109_TIFS_2014_2346014 crossref_primary_10_1016_j_jss_2014_03_079 crossref_primary_10_1016_j_jvcir_2019_03_020 crossref_primary_10_1109_TMM_2023_3282573 crossref_primary_10_4018_IJCVIP_2018040103 |
| Cites_doi | 10.1007/BFb0053419 10.1007/978-3-540-79499-8_16 10.1109/MARK.1979.8817296 10.1007/s10623-005-6342-0 10.3233/FI-2009-0064 10.1016/j.sigpro.2011.09.015 10.1016/j.patcog.2007.01.013 10.1023/A:1008280705142 10.1016/j.patcog.2008.08.023 10.1016/j.patcog.2005.06.010 10.1006/inco.1996.0076 10.1109/TIP.2006.884916 10.1016/j.patcog.2006.02.025 10.1364/OL.12.000377 10.1145/359168.359176 10.1016/j.jss.2011.02.023 10.1007/s001459900057 10.1016/S0031-3203(02)00258-3 10.1007/BFb0045084 10.1016/S0304-3975(99)00127-9 10.1016/S0020-0190(00)00108-3 10.1016/j.patcog.2008.11.015 |
| ContentType | Journal Article |
| Copyright | 2011 Elsevier Inc. Copyright Elsevier Sequoia S.A. May 2012 |
| Copyright_xml | – notice: 2011 Elsevier Inc. – notice: Copyright Elsevier Sequoia S.A. May 2012 |
| DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1016/j.jss.2011.12.041 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts Computer and Information Systems Abstracts |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1873-1228 |
| EndPage | 1134 |
| ExternalDocumentID | 2600142141 10_1016_j_jss_2011_12_041 S0164121211003220 |
| Genre | Feature |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29L 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN 9M8 AABNK AACTN AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN AAYOK ABBOA ABEFU ABFNM ABFRF ABFSI ABJNI ABMAC ABTAH ABXDB ABYKQ ACDAQ ACGFO ACGFS ACGOD ACNNM ACRLP ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEFWE AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AI. AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG RNS ROL RPZ RXW SBC SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ UHS UNMZH VH1 WUQ XPP ZMT ZY4 ~G- AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7SC 8FD AFXIZ AGCQF AGRNS JQ2 L7M L~C L~D SSH |
| ID | FETCH-LOGICAL-c357t-a6507e4ee1c99f54bb474ae26793a44c82324c55d3c2ca14fe9479e52441b5dd3 |
| IEDL.DBID | .~1 |
| ISSN | 0164-1212 |
| IngestDate | Sat Sep 27 20:01:00 EDT 2025 Fri Jul 25 02:35:01 EDT 2025 Thu Apr 24 23:02:52 EDT 2025 Wed Oct 01 04:23:09 EDT 2025 Fri Feb 23 02:32:34 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5 |
| Keywords | Visual secret sharing Access structure Random grid Cheating immune |
| Language | English |
| License | https://www.elsevier.com/tdm/userlicense/1.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c357t-a6507e4ee1c99f54bb474ae26793a44c82324c55d3c2ca14fe9479e52441b5dd3 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
| PQID | 925769224 |
| PQPubID | 45802 |
| PageCount | 16 |
| ParticipantIDs | proquest_miscellaneous_1022880089 proquest_journals_925769224 crossref_citationtrail_10_1016_j_jss_2011_12_041 crossref_primary_10_1016_j_jss_2011_12_041 elsevier_sciencedirect_doi_10_1016_j_jss_2011_12_041 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2012-05-01 |
| PublicationDateYYYYMMDD | 2012-05-01 |
| PublicationDate_xml | – month: 05 year: 2012 text: 2012-05-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | The Journal of systems and software |
| PublicationYear | 2012 |
| Publisher | Elsevier Inc Elsevier Sequoia S.A |
| Publisher_xml | – name: Elsevier Inc – name: Elsevier Sequoia S.A |
| References | Horng, Chen, Tsai (bib0050) 2006; 38 Hou (bib0055) 2003; 36 Naor, Shamir (bib0075) 1995; 950 Shyu (bib0090) 2007; 40 Blundo, De Santis, Naor (bib0020) 2000; 75 Hofmeister, Krause, Simon (bib0045) 1997 Ateniese, Blundo, Santis, Stinson (bib0010) 2001; 250 Shyu (bib0085) 2006; 39 Blakley, G.R., 1979. Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, vol. 48, pp. 313–317. , Chen, Tsao (bib0040) 2011; 84 Blundo, De Santis, Stinson (bib0025) 1999; 12 Wang, D., Li, X., Yi, F., 2008. Probabilistic Hu, Tzeng (bib0060) 2007; 16 Chang, Chen, Liu (bib0030) 2009; 92 visual secret sharing scheme for grayscale images. In: Information Security and Cryptology, Springer, pp. 192–200. Tsai, Chen, Horng (bib0100) 2007; 40 Shamir (bib0080) 1979; 22 Ateniese, Blundo, De Santis, Stinson (bib0005) 1996; 129 Shyu (bib0095) 2009; 42 Chen, Tsao (bib0035) 2009; 42 Verheul, Van Tilborg (bib0105) 1997; 11 Kafri, Keren (bib0065) 1987; 12 Lee, Chen (bib0070) 2012; 92 Shyu (10.1016/j.jss.2011.12.041_bib0090) 2007; 40 Tsai (10.1016/j.jss.2011.12.041_bib0100) 2007; 40 Verheul (10.1016/j.jss.2011.12.041_bib0105) 1997; 11 Lee (10.1016/j.jss.2011.12.041_bib0070) 2012; 92 Ateniese (10.1016/j.jss.2011.12.041_bib0010) 2001; 250 Chen (10.1016/j.jss.2011.12.041_bib0040) 2011; 84 Ateniese (10.1016/j.jss.2011.12.041_bib0005) 1996; 129 Naor (10.1016/j.jss.2011.12.041_bib0075) 1995; 950 Shyu (10.1016/j.jss.2011.12.041_bib0085) 2006; 39 Kafri (10.1016/j.jss.2011.12.041_bib0065) 1987; 12 Blundo (10.1016/j.jss.2011.12.041_bib0025) 1999; 12 Horng (10.1016/j.jss.2011.12.041_bib0050) 2006; 38 Hu (10.1016/j.jss.2011.12.041_bib0060) 2007; 16 Blundo (10.1016/j.jss.2011.12.041_bib0020) 2000; 75 10.1016/j.jss.2011.12.041_bib0110 10.1016/j.jss.2011.12.041_bib0015 Chang (10.1016/j.jss.2011.12.041_bib0030) 2009; 92 Hou (10.1016/j.jss.2011.12.041_bib0055) 2003; 36 Chen (10.1016/j.jss.2011.12.041_bib0035) 2009; 42 Shamir (10.1016/j.jss.2011.12.041_bib0080) 1979; 22 Shyu (10.1016/j.jss.2011.12.041_bib0095) 2009; 42 Hofmeister (10.1016/j.jss.2011.12.041_bib0045) 1997 |
| References_xml | – volume: 250 start-page: 143 year: 2001 end-page: 161 ident: bib0010 article-title: Extended capabilities for visual cryptography publication-title: Theoretical Computer Science – volume: 36 start-page: 1619 year: 2003 end-page: 1629 ident: bib0055 article-title: Visual cryptography for color images publication-title: Pattern Recognition – volume: 16 start-page: 36 year: 2007 end-page: 45 ident: bib0060 article-title: Cheating prevention in visual cryptography publication-title: IEEE Transactions on Image Processing – volume: 12 start-page: 377 year: 1987 end-page: 379 ident: bib0065 article-title: Encryption of pictures and shapes by random grids publication-title: Optics Letters – start-page: 176 year: 1997 end-page: 185 ident: bib0045 article-title: Contrast-optimal publication-title: Computing and Combinatorics – volume: 11 start-page: 179 year: 1997 end-page: 196 ident: bib0105 article-title: Constructions and properties of publication-title: Designs, Codes and Cryptography – volume: 84 start-page: 1197 year: 2011 end-page: 1208 ident: bib0040 article-title: Threshold visual secret sharing by random grids publication-title: Journal of Systems and Software – volume: 22 start-page: 612 year: 1979 end-page: 613 ident: bib0080 article-title: How to share a secret publication-title: Communications of the ACM – reference: Wang, D., Li, X., Yi, F., 2008. Probabilistic ( – reference: , – volume: 129 start-page: 86 year: 1996 end-page: 106 ident: bib0005 article-title: Visual cryptography for general access structures publication-title: Information and Computation – reference: Blakley, G.R., 1979. Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, vol. 48, pp. 313–317. – volume: 39 start-page: 866 year: 2006 end-page: 880 ident: bib0085 article-title: Efficient visual secret sharing scheme for color images publication-title: Pattern Recognition – volume: 38 start-page: 219 year: 2006 end-page: 236 ident: bib0050 article-title: Cheating in visual cryptography, Designs publication-title: Codes and Cryptography – volume: 42 start-page: 1582 year: 2009 end-page: 1596 ident: bib0095 article-title: Image encryption by multiple random grids publication-title: Pattern Recognition – volume: 42 start-page: 2203 year: 2009 end-page: 2217 ident: bib0035 article-title: Visual secret sharing by random grids revisited publication-title: Pattern Recognition – volume: 40 start-page: 1014 year: 2007 end-page: 1031 ident: bib0090 article-title: Image encryption by random grids publication-title: Pattern Recognition – volume: 950 start-page: 1 year: 1995 end-page: 12 ident: bib0075 article-title: Visual cryptography publication-title: Lecture Notes in Computer Science – volume: 75 start-page: 255 year: 2000 end-page: 259 ident: bib0020 article-title: Visual cryptography for grey level images publication-title: Information Processing Letters – reference: ) visual secret sharing scheme for grayscale images. In: Information Security and Cryptology, Springer, pp. 192–200. – volume: 12 start-page: 261 year: 1999 end-page: 289 ident: bib0025 article-title: On the contrast in visual cryptography schemes publication-title: Journal of Cryptology – volume: 92 start-page: 27 year: 2009 end-page: 42 ident: bib0030 article-title: Preventing cheating in computational visual cryptography publication-title: Fundamenta Informaticae – volume: 92 start-page: 727 year: 2012 end-page: 736 ident: bib0070 article-title: Insight into collusion attacks in random-grid-based visual secret sharing publication-title: Signal Processing – volume: 40 start-page: 2356 year: 2007 end-page: 2366 ident: bib0100 article-title: A cheating prevention scheme for binary visual cryptography with homogeneous secret images publication-title: Pattern Recognition – volume: 950 start-page: 1 year: 1995 ident: 10.1016/j.jss.2011.12.041_bib0075 article-title: Visual cryptography publication-title: Lecture Notes in Computer Science doi: 10.1007/BFb0053419 – ident: 10.1016/j.jss.2011.12.041_bib0110 doi: 10.1007/978-3-540-79499-8_16 – ident: 10.1016/j.jss.2011.12.041_bib0015 doi: 10.1109/MARK.1979.8817296 – volume: 38 start-page: 219 year: 2006 ident: 10.1016/j.jss.2011.12.041_bib0050 article-title: Cheating in visual cryptography, Designs publication-title: Codes and Cryptography doi: 10.1007/s10623-005-6342-0 – volume: 92 start-page: 27 year: 2009 ident: 10.1016/j.jss.2011.12.041_bib0030 article-title: Preventing cheating in computational visual cryptography publication-title: Fundamenta Informaticae doi: 10.3233/FI-2009-0064 – volume: 92 start-page: 727 year: 2012 ident: 10.1016/j.jss.2011.12.041_bib0070 article-title: Insight into collusion attacks in random-grid-based visual secret sharing publication-title: Signal Processing doi: 10.1016/j.sigpro.2011.09.015 – volume: 40 start-page: 2356 year: 2007 ident: 10.1016/j.jss.2011.12.041_bib0100 article-title: A cheating prevention scheme for binary visual cryptography with homogeneous secret images publication-title: Pattern Recognition doi: 10.1016/j.patcog.2007.01.013 – volume: 11 start-page: 179 year: 1997 ident: 10.1016/j.jss.2011.12.041_bib0105 article-title: Constructions and properties of k out of n visual secret sharing schemes publication-title: Designs, Codes and Cryptography doi: 10.1023/A:1008280705142 – volume: 42 start-page: 1582 year: 2009 ident: 10.1016/j.jss.2011.12.041_bib0095 article-title: Image encryption by multiple random grids publication-title: Pattern Recognition doi: 10.1016/j.patcog.2008.08.023 – volume: 39 start-page: 866 year: 2006 ident: 10.1016/j.jss.2011.12.041_bib0085 article-title: Efficient visual secret sharing scheme for color images publication-title: Pattern Recognition doi: 10.1016/j.patcog.2005.06.010 – volume: 129 start-page: 86 year: 1996 ident: 10.1016/j.jss.2011.12.041_bib0005 article-title: Visual cryptography for general access structures publication-title: Information and Computation doi: 10.1006/inco.1996.0076 – volume: 16 start-page: 36 year: 2007 ident: 10.1016/j.jss.2011.12.041_bib0060 article-title: Cheating prevention in visual cryptography publication-title: IEEE Transactions on Image Processing doi: 10.1109/TIP.2006.884916 – volume: 40 start-page: 1014 year: 2007 ident: 10.1016/j.jss.2011.12.041_bib0090 article-title: Image encryption by random grids publication-title: Pattern Recognition doi: 10.1016/j.patcog.2006.02.025 – volume: 12 start-page: 377 year: 1987 ident: 10.1016/j.jss.2011.12.041_bib0065 article-title: Encryption of pictures and shapes by random grids publication-title: Optics Letters doi: 10.1364/OL.12.000377 – volume: 22 start-page: 612 year: 1979 ident: 10.1016/j.jss.2011.12.041_bib0080 article-title: How to share a secret publication-title: Communications of the ACM doi: 10.1145/359168.359176 – volume: 84 start-page: 1197 year: 2011 ident: 10.1016/j.jss.2011.12.041_bib0040 article-title: Threshold visual secret sharing by random grids publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2011.02.023 – volume: 12 start-page: 261 year: 1999 ident: 10.1016/j.jss.2011.12.041_bib0025 article-title: On the contrast in visual cryptography schemes publication-title: Journal of Cryptology doi: 10.1007/s001459900057 – volume: 36 start-page: 1619 year: 2003 ident: 10.1016/j.jss.2011.12.041_bib0055 article-title: Visual cryptography for color images publication-title: Pattern Recognition doi: 10.1016/S0031-3203(02)00258-3 – start-page: 176 year: 1997 ident: 10.1016/j.jss.2011.12.041_bib0045 article-title: Contrast-optimal k out of n secret sharing schemes in visual cryptography publication-title: Computing and Combinatorics doi: 10.1007/BFb0045084 – volume: 250 start-page: 143 year: 2001 ident: 10.1016/j.jss.2011.12.041_bib0010 article-title: Extended capabilities for visual cryptography publication-title: Theoretical Computer Science doi: 10.1016/S0304-3975(99)00127-9 – volume: 75 start-page: 255 year: 2000 ident: 10.1016/j.jss.2011.12.041_bib0020 article-title: Visual cryptography for grey level images publication-title: Information Processing Letters doi: 10.1016/S0020-0190(00)00108-3 – volume: 42 start-page: 2203 year: 2009 ident: 10.1016/j.jss.2011.12.041_bib0035 article-title: Visual secret sharing by random grids revisited publication-title: Pattern Recognition doi: 10.1016/j.patcog.2008.11.015 |
| SSID | ssj0007202 |
| Score | 2.190282 |
| Snippet | ► We propose a RG-based VSS for general access structures. ► Pixel expansion problem is solve in the proposed scheme. ► Complex sharing strategy can be... Conventional visual secret sharing (VSS) encodes a secret image into shares which are m times as big as the secrets. m is called pixel expansion. Random grid... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1119 |
| SubjectTerms | Access structure Algorithms Cheating Cheating immune Computer programs Data encryption Image processing systems Pixels Random grid Software Strategy Studies Systems development Visual Visual secret sharing |
| Title | Random grid-based visual secret sharing for general access structures with cheat-preventing ability |
| URI | https://dx.doi.org/10.1016/j.jss.2011.12.041 https://www.proquest.com/docview/925769224 https://www.proquest.com/docview/1022880089 |
| Volume | 85 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1873-1228 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0007202 issn: 0164-1212 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier ScienceDirect customDbUrl: eissn: 1873-1228 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0007202 issn: 0164-1212 databaseCode: .~1 dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection customDbUrl: eissn: 1873-1228 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0007202 issn: 0164-1212 databaseCode: ACRLP dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals [SCFCJ] customDbUrl: eissn: 1873-1228 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0007202 issn: 0164-1212 databaseCode: AIKHN dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1873-1228 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0007202 issn: 0164-1212 databaseCode: AKRWK dateStart: 19950101 isFulltext: true providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA9DL178Fud0RPAkxK1ZsqxHEcdU3MEP8BbSJJ0T7YbdBC_-7b7XpoqCO3hsm0fKS95nXn6PkCOnut6nsWTe-BQCFJWwpG09A1uL2CwOjBamBq6H3cG9uHyQDzVyVt2FwbLKoPtLnV5o6_CmFbjZmo7HrVsEh4o4QpTBzuQc43YhFHYxOPn4LvNQvKg7xMEMR1cnm0WN11OelyiemBEU0V-26ZeWLkxPf52sBp-Rnpa_tUFqPtska1U_BhrEc4vYG5O5yQsdvY4dQ_Pk6Ns4nwNpjs7hjOaPBtN4FBxVOirxpqkpOibSEkd2DsE3xdQstaik2TQAPAFNief9vk3u--d3ZwMWmigw25Fqxgy4YMoL7yMbx6kUSSKUMJ53QTCNELaHLpWV0nUstyYSqY-Fir0Esx8l0rnODlnKJpnfJZSnSsqON0lxdqkckLu27MEEXCSR6tVJu2KftgFhHBtdPOuqlOxJA8c1clxHXAPH6-T4i2RawmssGiyqNdE_9ogG9b-IrFGtnw4CmusYA60Y_Jc6Ofz6CpKFxyUm85N5rjEWBu3W7sV7_5u4QVbgiZflkftkCRbSH4ALM0uaxR5tkuXTi6vB8BNMEPBF |
| linkProvider | Elsevier |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA6iB734FuszgichtpsmTfcoYqnPg7bgLWSTrFZ0W9xW8OJvd2Y3qyjYg9dNhiyTzDOTbwg5dKrlfRpL5o1PIUBRCUsa1jOwtYjN4sBoYWrg-qbV7YuLe3k_Q06rtzBYVhl0f6nTC20dvtQDN-ujwaB-h-BQEUeIMjiZnEPcPickVxiBHX9813koXhQe4myG06urzaLI6ynPSxhPTAmK6C_j9EtNF7ans0wWg9NIT8r_WiEzPlslS1VDBhrkc43YW5O54Qt9eB04hvbJ0bdBPgHSHL3DMc0fDebxKHiq9KEEnKamaJlISyDZCUTfFHOz1KKWZqOA8AQ0JaD3-zrpd856p10Wuigw25RqzAz4YMoL7yMbx6kUSSKUMJ63QDKNELaNPpWV0jUttyYSqY-Fir0Eux8l0rnmBpnNhpnfJJSnSsqmN0lxeakckLuGbMMCXCSRatdIo2KftgFiHDtdPOuqluxJA8c1clxHXAPHa-Toi2RU4mtMmyyqPdE_DokG_T-NbLvaPx0kNNcxRloxODA1cvA1CqKF9yUm88NJrjEYBvXWaMdb_1t4n8x3e9dX-ur85nKbLMAIL2sld8gsbKrfBX9mnOwV5_UT4c_x2g |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Random+grid-based+visual+secret+sharing+for+general+access+structures+with+cheat-preventing+ability&rft.jtitle=The+Journal+of+systems+and+software&rft.au=Wu%2C+Xiaotian&rft.au=Sun%2C+Wei&rft.date=2012-05-01&rft.issn=0164-1212&rft.volume=85&rft.issue=5&rft.spage=1119&rft.epage=1134&rft_id=info:doi/10.1016%2Fj.jss.2011.12.041&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jss_2011_12_041 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0164-1212&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0164-1212&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0164-1212&client=summon |