Yang Chenyang, Mao Shiyi, Li Shaohong. IMM BASED NONITERATIVE ADAPTIVE VARIABLE DATA RATE ALGORITHM[J]. Journal of Electronics & Information Technology, 1999, 21(3): 337-342.
Citation:
Fu Zheng-Xin, Yu Bin, Fang Li-Guo. The Access-based Multi-secret Visual Cryptography with Compression Algorithm[J]. Journal of Electronics & Information Technology, 2013, 35(5): 1055-1062. doi: 10.3724/SP.J.1146.2012.00415
Yang Chenyang, Mao Shiyi, Li Shaohong. IMM BASED NONITERATIVE ADAPTIVE VARIABLE DATA RATE ALGORITHM[J]. Journal of Electronics & Information Technology, 1999, 21(3): 337-342.
Citation:
Fu Zheng-Xin, Yu Bin, Fang Li-Guo. The Access-based Multi-secret Visual Cryptography with Compression Algorithm[J]. Journal of Electronics & Information Technology, 2013, 35(5): 1055-1062. doi: 10.3724/SP.J.1146.2012.00415
According to the mapping relationship between the multiple secret images pixel combinations and the basis matrices, the redundant basis matrices are analyzed in the access-based multi-secret visual cryptography. A compression algorithm is proposed to decrease the size of basis matrices. The algorithm takes one column pixels as disposal unit, and satisfies the entire contrast of secret images. Based on the algorithm, new secret sharing and recovering procedures are designed for the access-based multi-secret visual cryptography. Compared with previous schemes, the present scheme can diminish the size of shares effectively, and the compression effects are obvious for the simple images.
Yang Chenyang, Mao Shiyi, Li Shaohong. IMM BASED NONITERATIVE ADAPTIVE VARIABLE DATA RATE ALGORITHM[J]. Journal of Electronics & Information Technology, 1999, 21(3): 337-342.
Yang Chenyang, Mao Shiyi, Li Shaohong. IMM BASED NONITERATIVE ADAPTIVE VARIABLE DATA RATE ALGORITHM[J]. Journal of Electronics & Information Technology, 1999, 21(3): 337-342.