CHARAKTERYSTYKA WYBRANYCH TECHNIK UKRYWANIA OBRAZU

Agnieszka Świerkosz

aswierk@agh.edu.pl
AGH w Krakowie, Katedra Automatyki i Inżynierii Biomedycznej (Polska)

Abstrakt

Zważywszy, że różne techniki utajniania obrazów są znane od dawna, lecz nie znalazły szerszego zastosowania, być może ze względu na ich mankamenty, w tej publikacji zostaną opisane niektóre rodzaje technik sekretnego podziału obrazów, które już są. Autor ma na celu przeglądnięcie tych technik i ich podsumowanie.


Słowa kluczowe:

kodowanie obrazu, rekonstrukcja obrazu, ochrona danych, autentykacja

Ahuja B.S., Frooq O., Kaur S., Singhal R., Digital watermarking of ECG data for secure wireless communication, International Conference on Recent Trends in Information. Telecommunication and Computing, IEEE Computer Society, 2010.
  Google Scholar

Ansair N., Ni Z., Lin X., Shi Y. Q., Su W., Sun Q., Robust lossless image data hiding designed for semi-fragile image authentication, IEEE Transactions on Circuits and Systems for Video Technology 18(4)/2008,497–509.
  Google Scholar

Ateniese G., Blundo C., De Santis A., Stinson D. R., Visual cryptography for general access structures, Information and Computation 129(2)/1996, 86–106.
  Google Scholar

Banerjee A., Gupta S. K. S., Venkatasubramanian K. K., PSKA: Usable and secure key agreement scheme for Body Area Network, IEEE Transactions on Information Technology in Biomedicine 14(1)/2010.
  Google Scholar

Blakley G. R., Safeguarding cryptographic keys, Proceedings of AFIPS National Computer Conference 48/1979, 313–317.
  Google Scholar

Blundo C., Naor, M., De Santis A., Visual cryptography for grey level images, Information Processing Letters 75/2000, 255–259.
  Google Scholar

Blundo C., De Santis A., Stinson D. R., On the Contrast in Visual Cryptography Schemes, Journal of Cryptology 12/1999, 261–289.
  Google Scholar

De Bonis A., De Santis A., Randomnees in visual cryptography, Theoretical Computer Science 314(3)/2004, 351–374.
  Google Scholar

Chang C. C., Chan C. S., Lin P. Y., Secret Image Sharing with Reversible Steganography, 2009 International Conference on Computational Intelligence and Natural Computing, IEEE 2009.
  Google Scholar

Chang C.C, Chen T.S., Tsai C. S., Sharing multiple secrets in digital images , Journal of Systems and SoftwareCIP99 64(2)/2002, 163–170.
  Google Scholar

Chang C. C., Wu H. C., Sharing visual multi-secrets using circle shares, Computer Standards & Interfaces 28(1)/2005, 123–135.
  Google Scholar

Chen T. S., Yang C. N., An image secret sharing scheme with the capability of previewing the secret image, IEEE 2007.
  Google Scholar

Chen T. S., Yang C. N., Reduce Shadow Size in Aspect Ratio Invariant Visual Secret Sharing Schemes using a Square Block-wise Operation, Patter Recognition 39(7)/2006, 1300–1314.
  Google Scholar

Chen L. H., Wu C. C., A study on visual cryptography. Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, 1998.
  Google Scholar

Cox I. J., Bloom J. A., Miller M. L., Digital Watermarking, Morgan Kaufmann Publishers Inc., San Francisco, CA, 2001.
  Google Scholar

Cimato S., De Prisco R., De Santis A., Colored visual cryptography without color darkening, Theoretical Computer Science 374(1–3)/2007, 261–276.
  Google Scholar

Cimato S., Prisco R., Santis A., Probabilistic visual cryptography schemes, The computer Journal 49/2006, 97–107.
  Google Scholar

Eisen P. A., Stinson D. R., Threshold visual cryptography schemes with specified whiteness, Designs, Codes and Cryptography 25(1)/2002, 15–61.
  Google Scholar

Fang W.P., Friendly progressive visual secret sharing, Pattern Recognition 41(4)/2008, 1410–1414.
  Google Scholar

Giakoumaki A., Koutsouris D., Pavlopoulos S., Secure and efficient health data management through multiple watermarking on medical images, Med. Bio. Eng. Comput. 44/2006, 619–631.
  Google Scholar

Hofmeister T., Krause M., Simon, H., Contrast-Optimal k out of n Secret Sharing Schemes in Visual Cryptography, In Proceedings of the Third Annual international Conference on Computing and Combinatorics 1276/1997, 176–185.
  Google Scholar

Hou Y.C., Visual cryptography for color images, Pattern Recognition 36/2003, 1619–1629.
  Google Scholar

Huang S. Y., Lee Y. K., Shyu S. J., Wang R.Z., Sharing multiple secrets in visual cryptography, Pattern Recognition 40(12)/2007, 3633–3657.
  Google Scholar

Hsueh N. L., Lin C. C., A lossless data hiding scheme based on three-pixel block differences, Pattern Recognition 41(4)/2008, 1415–1425.
  Google Scholar

Ibaida A., Khalil I., van Schyndel R., A low complexity high capacity ECG signal watermark for wearable sensor-net health monitoring system, Computing in Cardiology 38/2011, 393–396.
  Google Scholar

Katzenbeisser S., Petitcolas F.A.P., Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Inc., Boston, 2000.
  Google Scholar

Laih C. S., Yang C. N., New colored visual secret sharing schemes, Designs, Codes and Cryptography 20(3)/2000, 325–335.
  Google Scholar

Li P., Ma P., Su X., Image secret sharing and hiding with authentication, 2010 First International Conference on Pervasive Computing, Signal Processing and Applications, IEEE 2010.
  Google Scholar

Lin C. C., Tsai W. H., Visual cryptography for gray-level images by dithering techniques, Pattern Recognition Letters 2003, 349–358.
  Google Scholar

Lin J. C., Thien C. C., Secret image sharing, Computers & Graphics, 26/2002, 765–770.
  Google Scholar

Nabiyev V. V., Ulutas G., Ulutas M., Yazici R., (2, 2)-Secret Sharing Scheme with Improved Share Randomnes, IEEE 2008.
  Google Scholar

Noar M., Shamir A., Visual cryptography, Advances in Cryptology: Eurocrypt’94, Spring-Verlag, Berlin 1995,1–12.
  Google Scholar

Rodriguez J. J., Thodi D. M., Expansion embedding techniques for reversible watermarking, IEEE Transactions on Image Processing 16(3)/2007, 721–730.
  Google Scholar

Shamir A., How to share a secret, Communications of the ACM 22(11)/1979, 612–613.
  Google Scholar

Shyu S. J., Efficient visual secret sharing scheme for color images, Patter Recognition 39(5)/2006, 866–880.
  Google Scholar

Stinson D. R., An introduction to visual cryptography, Public Key Solutions’97, Canada, April 11997.
  Google Scholar

Su C. H., Wang R. Z., Secret image sharing with smaller shadow images, Pattern Recognition Letters 27(6)/2006, 551–555.
  Google Scholar

Van Tilborg H. C. A., Verheul E. R., Constructions and Properties of k out of n Visual Secret Sharing Schemes, Designs, Codes and Cryptography 11(2)/1997, 179–196.
  Google Scholar

Pobierz


Opublikowane
2016-12-22

Cited By / Share

Świerkosz, A. . (2016). CHARAKTERYSTYKA WYBRANYCH TECHNIK UKRYWANIA OBRAZU. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 6(4), 43–48. https://doi.org/10.5604/01.3001.0009.5188

Autorzy

Agnieszka Świerkosz 
aswierk@agh.edu.pl
AGH w Krakowie, Katedra Automatyki i Inżynierii Biomedycznej Polska

Statystyki

Abstract views: 163
PDF downloads: 91