Affiliation:
1. Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan
2. Department of Computer Science, Jinan University, China
Abstract
Recently, three visual cryptography schemes with
t
-error-correcting capability (VCSs-
t
EC) were introduced for preventing the shadows carrying additional information from being corrupted by noise interference. However, the concerns on VCS-
t
EC, such as the average amount of carrying information, decoding of information from shadows, and the demonstration way of a secret, should be considered and improved. In this article, two schemes, namely the (
k, n
) probabilistic VCS-
t
EC (PVCS-
t
EC) and the (2,
n
) deterministic VCS-
t
EC (DVCS-
t
EC), are proposed. The concept of probabilistic VCS is combined with the Bose-Chaudhuri-Hocquenghem code (BCH code) for designing the (
k, n
) PVCS-
t
EC. Furthermore, some constant-weight BCH codewords are adopted to build the (2,
n
)-DVCS-
t
EC. Comprehensive results and experiments are demonstrated to clarify the enhancement of information-carrying and decoding by the two proposed methods.
Funder
National Natural Science Foundation of China
Guangdong Basic and Applied Basic Research Foundation
National Science and Technology Council
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Hardware and Architecture
Reference37 articles.
1. Theory of Unidirectional Error Correcting/Detecting Codes
2. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders;Chen Bing;IEEE Transactions on Dependable and Secure Computing,2022
3. Probabilistic Visual Cryptography Schemes
4. Visual cryptography for color images
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献