Equivalence Proof of Traditional and Random Grid-Based (2, 2) Visual Secret Sharing View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2014

AUTHORS

Shen Wang , Xuehu Yan , Jianzhi Sang , Xiamu Niu

ABSTRACT

Visual secret sharing (VSS) has attracted considerable attention to scientists and engineers as another branch alongside conventional cryptography to protect the sensitive visual information from several rapacious behaviors. In the literature, there are a number of several techniques used to protect the visual information, among which traditional VSS and random grid (RG)-based VSS are the primary branches. In this letter, we show, by examples, the two means are equal. In addition, the color representation of traditional VSS and RG-based VSS found it different from digital applications like images. Based on the given examples, it is demonstrated that the color representation of the two means can be the same and confirm with digital processing applications. More... »

PAGES

137-146

Book

TITLE

Intelligent Data analysis and its Applications, Volume II

ISBN

978-3-319-07772-7
978-3-319-07773-4

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-07773-4_14

DOI

http://dx.doi.org/10.1007/978-3-319-07773-4_14

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1036792422


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China", 
          "id": "http://www.grid.ac/institutes/grid.19373.3f", 
          "name": [
            "School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wang", 
        "givenName": "Shen", 
        "id": "sg:person.013117766471.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013117766471.90"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China", 
          "id": "http://www.grid.ac/institutes/grid.19373.3f", 
          "name": [
            "School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Yan", 
        "givenName": "Xuehu", 
        "id": "sg:person.010467364517.31", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China", 
          "id": "http://www.grid.ac/institutes/grid.19373.3f", 
          "name": [
            "School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Sang", 
        "givenName": "Jianzhi", 
        "id": "sg:person.015342734145.75", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015342734145.75"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China", 
          "id": "http://www.grid.ac/institutes/grid.19373.3f", 
          "name": [
            "School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Niu", 
        "givenName": "Xiamu", 
        "id": "sg:person.011071034626.54", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011071034626.54"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2014", 
    "datePublishedReg": "2014-01-01", 
    "description": "Visual secret sharing (VSS) has attracted considerable attention to scientists and engineers as another branch alongside conventional cryptography to protect the sensitive visual information from several rapacious behaviors. In the literature, there are a number of several techniques used to protect the visual information, among which traditional VSS and random grid (RG)-based VSS are the primary branches. In this letter, we show, by examples, the two means are equal. In addition, the color representation of traditional VSS and RG-based VSS found it different from digital applications like images. Based on the given examples, it is demonstrated that the color representation of the two means can be the same and confirm with digital processing applications.", 
    "editor": [
      {
        "familyName": "Pan", 
        "givenName": "Jeng-Shyang", 
        "type": "Person"
      }, 
      {
        "familyName": "Snasel", 
        "givenName": "Vaclav", 
        "type": "Person"
      }, 
      {
        "familyName": "Corchado", 
        "givenName": "Emilio S.", 
        "type": "Person"
      }, 
      {
        "familyName": "Abraham", 
        "givenName": "Ajith", 
        "type": "Person"
      }, 
      {
        "familyName": "Wang", 
        "givenName": "Shyue-Liang", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-07773-4_14", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-07772-7", 
        "978-3-319-07773-4"
      ], 
      "name": "Intelligent Data analysis and its Applications, Volume II", 
      "type": "Book"
    }, 
    "keywords": [
      "visual secret sharing", 
      "traditional visual secret sharing", 
      "secret sharing", 
      "random grids", 
      "visual information", 
      "color representation", 
      "digital processing applications", 
      "conventional cryptography", 
      "processing applications", 
      "equivalence proof", 
      "digital applications", 
      "sharing", 
      "cryptography", 
      "grid", 
      "representation", 
      "information", 
      "applications", 
      "images", 
      "considerable attention", 
      "engineers", 
      "example", 
      "proof", 
      "technique", 
      "scientists", 
      "means", 
      "branches", 
      "number", 
      "attention", 
      "letter", 
      "Traditional", 
      "literature", 
      "behavior", 
      "addition", 
      "RG", 
      "primary branches"
    ], 
    "name": "Equivalence Proof of Traditional and Random Grid-Based (2, 2) Visual Secret Sharing", 
    "pagination": "137-146", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1036792422"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-07773-4_14"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-07773-4_14", 
      "https://app.dimensions.ai/details/publication/pub.1036792422"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-11-24T21:11", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221124/entities/gbq_results/chapter/chapter_1.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-07773-4_14"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-07773-4_14'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-07773-4_14'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-07773-4_14'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-07773-4_14'


 

This table displays all metadata directly associated to this object as RDF triples.

135 TRIPLES      22 PREDICATES      60 URIs      53 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-07773-4_14 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author Na6e5dd53a6b34ca88f8a94e48cefd5da
4 schema:datePublished 2014
5 schema:datePublishedReg 2014-01-01
6 schema:description Visual secret sharing (VSS) has attracted considerable attention to scientists and engineers as another branch alongside conventional cryptography to protect the sensitive visual information from several rapacious behaviors. In the literature, there are a number of several techniques used to protect the visual information, among which traditional VSS and random grid (RG)-based VSS are the primary branches. In this letter, we show, by examples, the two means are equal. In addition, the color representation of traditional VSS and RG-based VSS found it different from digital applications like images. Based on the given examples, it is demonstrated that the color representation of the two means can be the same and confirm with digital processing applications.
7 schema:editor N4d376630bca347ec8056ef2a140211b2
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf Nd3dbfc87b6d34bfabafe80029d24b287
11 schema:keywords RG
12 Traditional
13 addition
14 applications
15 attention
16 behavior
17 branches
18 color representation
19 considerable attention
20 conventional cryptography
21 cryptography
22 digital applications
23 digital processing applications
24 engineers
25 equivalence proof
26 example
27 grid
28 images
29 information
30 letter
31 literature
32 means
33 number
34 primary branches
35 processing applications
36 proof
37 random grids
38 representation
39 scientists
40 secret sharing
41 sharing
42 technique
43 traditional visual secret sharing
44 visual information
45 visual secret sharing
46 schema:name Equivalence Proof of Traditional and Random Grid-Based (2, 2) Visual Secret Sharing
47 schema:pagination 137-146
48 schema:productId N78344055d1624072b76119e02a2b0c7a
49 N91ae1a2d361f47c1bfa9b400fcbe854f
50 schema:publisher N38f2782d1de34cd491d02ec47cc5c844
51 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036792422
52 https://doi.org/10.1007/978-3-319-07773-4_14
53 schema:sdDatePublished 2022-11-24T21:11
54 schema:sdLicense https://scigraph.springernature.com/explorer/license/
55 schema:sdPublisher N69d34e80cfbb47fe914d5ce40bfe66a4
56 schema:url https://doi.org/10.1007/978-3-319-07773-4_14
57 sgo:license sg:explorer/license/
58 sgo:sdDataset chapters
59 rdf:type schema:Chapter
60 N1ce6ca42a4434d2dbb872833fbb7877a schema:familyName Wang
61 schema:givenName Shyue-Liang
62 rdf:type schema:Person
63 N2e743c5e2b774ec5ac98a7907993eab4 schema:familyName Corchado
64 schema:givenName Emilio S.
65 rdf:type schema:Person
66 N3135b432cdff486393b6aa5d3b785814 schema:familyName Abraham
67 schema:givenName Ajith
68 rdf:type schema:Person
69 N38f2782d1de34cd491d02ec47cc5c844 schema:name Springer Nature
70 rdf:type schema:Organisation
71 N4d376630bca347ec8056ef2a140211b2 rdf:first N9a7f62378192472e9e8b6cb69b495dfc
72 rdf:rest Na4ac34d19de34ea1953b3c21650c598f
73 N68a71978ca7943e69715039c710ce07a schema:familyName Snasel
74 schema:givenName Vaclav
75 rdf:type schema:Person
76 N69d34e80cfbb47fe914d5ce40bfe66a4 schema:name Springer Nature - SN SciGraph project
77 rdf:type schema:Organization
78 N6bef965082704fbb9615443c71c6b592 rdf:first N3135b432cdff486393b6aa5d3b785814
79 rdf:rest Ne97e456afde64a2086ac93d54fe6dbed
80 N78344055d1624072b76119e02a2b0c7a schema:name doi
81 schema:value 10.1007/978-3-319-07773-4_14
82 rdf:type schema:PropertyValue
83 N91ae1a2d361f47c1bfa9b400fcbe854f schema:name dimensions_id
84 schema:value pub.1036792422
85 rdf:type schema:PropertyValue
86 N92664588bd5e4bcd979a1e6c0139f893 rdf:first sg:person.015342734145.75
87 rdf:rest Nc13b3f1872e043f5bb50dbf4822a2311
88 N9a7f62378192472e9e8b6cb69b495dfc schema:familyName Pan
89 schema:givenName Jeng-Shyang
90 rdf:type schema:Person
91 Na4ac34d19de34ea1953b3c21650c598f rdf:first N68a71978ca7943e69715039c710ce07a
92 rdf:rest Nba0e461bb7fd40a3a033b14716acb8c3
93 Na6e5dd53a6b34ca88f8a94e48cefd5da rdf:first sg:person.013117766471.90
94 rdf:rest Nc4666961be254e4b820a6f0a652a9f9c
95 Nba0e461bb7fd40a3a033b14716acb8c3 rdf:first N2e743c5e2b774ec5ac98a7907993eab4
96 rdf:rest N6bef965082704fbb9615443c71c6b592
97 Nc13b3f1872e043f5bb50dbf4822a2311 rdf:first sg:person.011071034626.54
98 rdf:rest rdf:nil
99 Nc4666961be254e4b820a6f0a652a9f9c rdf:first sg:person.010467364517.31
100 rdf:rest N92664588bd5e4bcd979a1e6c0139f893
101 Nd3dbfc87b6d34bfabafe80029d24b287 schema:isbn 978-3-319-07772-7
102 978-3-319-07773-4
103 schema:name Intelligent Data analysis and its Applications, Volume II
104 rdf:type schema:Book
105 Ne97e456afde64a2086ac93d54fe6dbed rdf:first N1ce6ca42a4434d2dbb872833fbb7877a
106 rdf:rest rdf:nil
107 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
108 schema:name Information and Computing Sciences
109 rdf:type schema:DefinedTerm
110 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
111 schema:name Artificial Intelligence and Image Processing
112 rdf:type schema:DefinedTerm
113 sg:person.010467364517.31 schema:affiliation grid-institutes:grid.19373.3f
114 schema:familyName Yan
115 schema:givenName Xuehu
116 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31
117 rdf:type schema:Person
118 sg:person.011071034626.54 schema:affiliation grid-institutes:grid.19373.3f
119 schema:familyName Niu
120 schema:givenName Xiamu
121 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011071034626.54
122 rdf:type schema:Person
123 sg:person.013117766471.90 schema:affiliation grid-institutes:grid.19373.3f
124 schema:familyName Wang
125 schema:givenName Shen
126 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013117766471.90
127 rdf:type schema:Person
128 sg:person.015342734145.75 schema:affiliation grid-institutes:grid.19373.3f
129 schema:familyName Sang
130 schema:givenName Jianzhi
131 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015342734145.75
132 rdf:type schema:Person
133 grid-institutes:grid.19373.3f schema:alternateName School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China
134 schema:name School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China
135 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...