Content Based Authentication of Visual Cryptography

aut.relation.endpage1
aut.relation.issue245en_NZ
aut.relation.pages13
aut.relation.startpage1
aut.relation.volume75en_NZ
aut.researcherYan, Wei-Qi
dc.contributor.authorWang, Gen_NZ
dc.contributor.authorYan, W-Qen_NZ
dc.contributor.authorKankanhalli, Men_NZ
dc.date.accessioned2016-04-20T22:18:54Z
dc.date.available2016-04-20T22:18:54Z
dc.date.copyright2016-12-31en_NZ
dc.date.issued2016-12-31en_NZ
dc.description.abstractVisual Cryptography (VC) has been developed as a significant research arena in media security. Despite of its obvious strengths, recent investigations have debated this scheme from adverse aspects, its problem is lack of authentication of VC shares, VC authentication related to digital image processing and cryptography has not been fully integrated together in the past years. In this paper, we analyze both visual features and cryptographic features of VC shares and take use of them for VC authentication. Compared to those existing methods, our contribution is the first one to integrate visual features and cryptographic features of VC shares into Hash code for the purpose of VC authentication.
dc.identifier.citationMultimedia Tools and Applications, 76(7), 9427-9441.en_NZ
dc.identifier.doi10.1007/s11042-016-3549-1
dc.identifier.issn1573-7721en_NZ
dc.identifier.urihttps://hdl.handle.net/10292/9733
dc.publisherSpringer
dc.relation.urihttp://link.springer.com/journal/11042en_NZ
dc.rightsAn author may self-archive an author-created version of his/her article on his/her own website and or in his/her institutional repository. He/she may also deposit this version on his/her funder’s or funder’s designated repository at the funder’s request or as a result of a legal obligation, provided it is not made publicly available until 12 months after official publication. He/ she may not use the publisher's PDF version, which is posted on www.springerlink.com, for the purpose of self-archiving or deposit. Furthermore, the author may only post his/her version provided acknowledgement is given to the original source of publication and a link is inserted to the published article on Springer's website. The link must be accompanied by the following text: "The final publication is available at www.springerlink.com”. (Please also see Publisher’s Version and Citation).
dc.rights.accessrightsOpenAccessen_NZ
dc.subjectVisual cryptography; Secret sharing; Digital image processing
dc.titleContent Based Authentication of Visual Cryptographyen_NZ
dc.typeJournal Article
pubs.elements-id202567
pubs.organisational-data/AUT
pubs.organisational-data/AUT/Design & Creative Technologies
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
MTAP-D-15-01208_R1.pdf
Size:
1.91 MB
Format:
Adobe Portable Document Format
Description:
Journal article
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
RE4.10 Grant of Licence.docx
Size:
14.05 KB
Format:
Microsoft Word 2007+
Description: