当前位置: X-MOL 学术Signal Process. Image Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Voronoi-based image representation applied to binary visual cryptography
Signal Processing: Image Communication ( IF 3.5 ) Pub Date : 2020-06-18 , DOI: 10.1016/j.image.2020.115913
Mahmoud Melkemi , Karim Hammoudi

A common processing scheme of Visual Cryptography (VC) consists of generating two ciphered images from a secret image. The sender transmits these key images via two different channels. The receiver collects the key images and recovers the secret image by superimposing them. In this article, Voronoi tessellation is exploited in Visual Cryptography for the first time to the best of our knowledge. The proposed Voronoi-based Visual Cryptography (VVC) technique permits to drastically reduce the amount of encoded and transmitted information by comparison with a traditional VC scheme. Hence, the technique can be used for transmissions of secret images with enforcement of the transmission reliability by enhancing the redundancy of information or with communication networks and technologies having low bandwidth and memory. Moreover, the random arrangement of the Voronoi polygons makes the transmission of the secret image more secure since the sender and the recipient use a private generator of random points. In addition, shape reconstruction properties of the image-based Voronoi representation are stated.



中文翻译:

基于Voronoi的图像表示法应用于二进制视觉加密

可视密码术(VC)的常见处理方案包括从秘密图像生成两个加密图像。发送者通过两个不同的通道发送这些关键图像。接收者收集关键图像并通过叠加来恢复秘密图像。在本文中,就我们所知,Voronoi镶嵌是首次在视觉密码学中得到利用的。所提出的基于Voronoi的视觉密码技术(VVC)与传统的VC方案相比,可以大大减少编码和传输的信息量。因此,该技术可以通过增强信息的冗余度或通过具有低带宽和存储器的通信网络和技术来用于秘密图像的传输,并具有传输可靠性的增强。此外,由于发送者和接收者使用随机点的专用生成器,因此Voronoi多边形的随机排列使秘密图像的传输更加安全。此外,还陈述了基于图像的Voronoi表示的形状重构特性。

更新日期:2020-06-22
down
wechat
bug