Cryptography Reference
In-Depth Information
pixels needed. Black pixels are inserted only when a sucient number of black
pixels have not yet been produced. By carefully selecting the grayscale images,
the second method can also generate shares with visually pleasing images. For
both methods, the decoded image does not suffer any interference from the
shared images. It is clear that there is a tradeoff between the shared image
quality and the contrast loss of the decoded image. However, by simple linear
filtering, the contrast loss can be easily recovered.
Bibliography
[1] M. Analoui and J. P. Allebach. Model-based halftoning using direct
binary search. In Proc. SPIE, volume 1666, pages 96{108, Feb. 1992.
[2] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson. Visual cryp-
tography for general access structures.
Information and Computation,
129(2):86{106, Sept. 1996.
[3] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson. Extended
capabilities for visual cryptography. Theoret. Comput. Sci., 250:143{161,
2001.
[4] J. Bacca, G. R. Arce, and D. L. Lau. Blue noise multitone dithering.
IEEE Trans. Image Process., 17(8):1368{1382, Sep. 2008.
[5] C. Blundo, P. D'Arco, A. De Santis, and D. R. Stinson. Contrast op-
timal threshold visual cryptography schemes. SIAM J. Discrete Math.,
16(2):224{261, 2003.
[6] R. Eschbach, Z. Fan, K. T. Knox, and G. Marcu. Threshold modulation
and stability in error diusion. IEEE Signal Process. Mag., 20:39{50, Jul.
2003.
[7] F. Faheem, D. L. Lau, and G. R. Arce. Digital multitoning using gray
level separation. J. Imag. Sci. and Tech., 46(5):385{397, Sep. 2002.
[8] M. S. Fu and O. C. Au. Joint visual cryptography and watermarking.
In Proc. IEEE Int. Conf. on Multimedia and Expo, Taipei, Taiwan, Jun.
2004.
[9] A. J. Gonzalez, G. R. Arce, J. Bacca Rodriguez, and D. L. Lau. Human
visual alpha-stable models for digital halftoning. In Proc. 18th Annual
Symp. on Electron. Imag. Sci. and Tech.: Human Vision and Electro.
Imag. XI, San Jose, CA, Jan. 2006.
 
 
Search WWH ::




Custom Search