Essential Visual Cryptographic Scheme with Different Importance of Shares View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2014

AUTHORS

Xuehu Yan , Shen Wang , Xiamu Niu , Ching-Nung Yang

ABSTRACT

Essential secret image sharing scheme allows some participants own special privileges with different importance of shares. The beauty of visual cryptographic scheme (VCS) is that its decoding is based on stacking and human visual system (HVS) without cryptographic computation. In this paper, for the first time essential and non-essential VCS (ENVCS) is introduced based on pre-existed (k,n) VCS. In the proposed (k0,n0,k,n) ENVCS, we generate the secret image into n shares which are classified into n0 essential shares and n − n0 non-essential shares. In the decoding phase, in order to reveal secret we should collect at least k shares, among which there are at least k0 essential shares. Experiments are conducted to evaluate the security and efficiency of the proposed scheme. More... »

PAGES

636-643

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-12643-2_77

DOI

http://dx.doi.org/10.1007/978-3-319-12643-2_77

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1043062020


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China", 
          "id": "http://www.grid.ac/institutes/grid.19373.3f", 
          "name": [
            "School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Yan", 
        "givenName": "Xuehu", 
        "id": "sg:person.010467364517.31", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China", 
          "id": "http://www.grid.ac/institutes/grid.19373.3f", 
          "name": [
            "School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wang", 
        "givenName": "Shen", 
        "id": "sg:person.013117766471.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013117766471.90"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China", 
          "id": "http://www.grid.ac/institutes/grid.19373.3f", 
          "name": [
            "School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Niu", 
        "givenName": "Xiamu", 
        "id": "sg:person.011071034626.54", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011071034626.54"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of CSIE, National Dong Hwa University, 974, Hualien, Taiwan", 
          "id": "http://www.grid.ac/institutes/grid.260567.0", 
          "name": [
            "Department of CSIE, National Dong Hwa University, 974, Hualien, Taiwan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Yang", 
        "givenName": "Ching-Nung", 
        "id": "sg:person.012350400311.86", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012350400311.86"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2014", 
    "datePublishedReg": "2014-01-01", 
    "description": "Essential secret image sharing scheme allows some participants own special privileges with different importance of shares. The beauty of visual cryptographic scheme (VCS) is that its decoding is based on stacking and human visual system (HVS) without cryptographic computation. In this paper, for the first time essential and non-essential VCS (ENVCS) is introduced based on pre-existed (k,n) VCS. In the proposed (k0,n0,k,n) ENVCS, we generate the secret image into n shares which are classified into n0 essential shares and n\u2009\u2212\u2009n0 non-essential shares. In the decoding phase, in order to reveal secret we should collect at least k shares, among which there are at least k0 essential shares. Experiments are conducted to evaluate the security and efficiency of the proposed scheme.", 
    "editor": [
      {
        "familyName": "Loo", 
        "givenName": "Chu Kiong", 
        "type": "Person"
      }, 
      {
        "familyName": "Yap", 
        "givenName": "Keem Siah", 
        "type": "Person"
      }, 
      {
        "familyName": "Wong", 
        "givenName": "Kok Wai", 
        "type": "Person"
      }, 
      {
        "familyName": "Beng Jin", 
        "givenName": "Andrew Teoh", 
        "type": "Person"
      }, 
      {
        "familyName": "Huang", 
        "givenName": "Kaizhu", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-12643-2_77", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-12642-5", 
        "978-3-319-12643-2"
      ], 
      "name": "Neural Information Processing", 
      "type": "Book"
    }, 
    "keywords": [
      "visual cryptographic scheme", 
      "human visual system", 
      "cryptographic schemes", 
      "secret image sharing scheme", 
      "image sharing scheme", 
      "essential share", 
      "different importance", 
      "essential secret image sharing scheme", 
      "cryptographic computations", 
      "secret image", 
      "decoding phase", 
      "n shares", 
      "sharing scheme", 
      "scheme", 
      "special privileges", 
      "visual system", 
      "security", 
      "decoding", 
      "computation", 
      "images", 
      "system", 
      "share", 
      "efficiency", 
      "privilege", 
      "order", 
      "experiments", 
      "time", 
      "importance", 
      "phase", 
      "participants", 
      "first time", 
      "beauty", 
      "paper"
    ], 
    "name": "Essential Visual Cryptographic Scheme with Different Importance of Shares", 
    "pagination": "636-643", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1043062020"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-12643-2_77"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-12643-2_77", 
      "https://app.dimensions.ai/details/publication/pub.1043062020"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-11-24T21:16", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221124/entities/gbq_results/chapter/chapter_323.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-12643-2_77"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12643-2_77'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12643-2_77'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12643-2_77'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12643-2_77'


 

This table displays all metadata directly associated to this object as RDF triples.

136 TRIPLES      22 PREDICATES      58 URIs      51 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-12643-2_77 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N1a0b74e393514e26a0aa542a2d1ad2ca
4 schema:datePublished 2014
5 schema:datePublishedReg 2014-01-01
6 schema:description Essential secret image sharing scheme allows some participants own special privileges with different importance of shares. The beauty of visual cryptographic scheme (VCS) is that its decoding is based on stacking and human visual system (HVS) without cryptographic computation. In this paper, for the first time essential and non-essential VCS (ENVCS) is introduced based on pre-existed (k,n) VCS. In the proposed (k0,n0,k,n) ENVCS, we generate the secret image into n shares which are classified into n0 essential shares and n − n0 non-essential shares. In the decoding phase, in order to reveal secret we should collect at least k shares, among which there are at least k0 essential shares. Experiments are conducted to evaluate the security and efficiency of the proposed scheme.
7 schema:editor Nda352b6889694ed187d31afe75fcf099
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf N8e9d988f6cbf4e3185ae3e6d0e0a3aa0
11 schema:keywords beauty
12 computation
13 cryptographic computations
14 cryptographic schemes
15 decoding
16 decoding phase
17 different importance
18 efficiency
19 essential secret image sharing scheme
20 essential share
21 experiments
22 first time
23 human visual system
24 image sharing scheme
25 images
26 importance
27 n shares
28 order
29 paper
30 participants
31 phase
32 privilege
33 scheme
34 secret image
35 secret image sharing scheme
36 security
37 share
38 sharing scheme
39 special privileges
40 system
41 time
42 visual cryptographic scheme
43 visual system
44 schema:name Essential Visual Cryptographic Scheme with Different Importance of Shares
45 schema:pagination 636-643
46 schema:productId N3f454e669c7b458b9e90498cd234429b
47 Nf7364929c7d44986869f21f9c8eff31d
48 schema:publisher N846aa2e85eb9443eb69e6120e0d6f623
49 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043062020
50 https://doi.org/10.1007/978-3-319-12643-2_77
51 schema:sdDatePublished 2022-11-24T21:16
52 schema:sdLicense https://scigraph.springernature.com/explorer/license/
53 schema:sdPublisher N4aea2753dd92425d9200f7a1cc27212f
54 schema:url https://doi.org/10.1007/978-3-319-12643-2_77
55 sgo:license sg:explorer/license/
56 sgo:sdDataset chapters
57 rdf:type schema:Chapter
58 N03c162a9067d486c835165a16546c77a rdf:first sg:person.013117766471.90
59 rdf:rest N30f5190dfd884a9bb290bb73da6108a0
60 N1a0b74e393514e26a0aa542a2d1ad2ca rdf:first sg:person.010467364517.31
61 rdf:rest N03c162a9067d486c835165a16546c77a
62 N2f0a2d008bf242d78a912ae8780a6465 rdf:first N5979e5db756d463bb12c55b90de2a97f
63 rdf:rest rdf:nil
64 N30f5190dfd884a9bb290bb73da6108a0 rdf:first sg:person.011071034626.54
65 rdf:rest Ncde7bec94eca48bba48aaa44fbf2c1f4
66 N36b9ba56bd8646ffbc9e0e06e9aff3a3 schema:familyName Beng Jin
67 schema:givenName Andrew Teoh
68 rdf:type schema:Person
69 N3f454e669c7b458b9e90498cd234429b schema:name dimensions_id
70 schema:value pub.1043062020
71 rdf:type schema:PropertyValue
72 N4aea2753dd92425d9200f7a1cc27212f schema:name Springer Nature - SN SciGraph project
73 rdf:type schema:Organization
74 N5979e5db756d463bb12c55b90de2a97f schema:familyName Huang
75 schema:givenName Kaizhu
76 rdf:type schema:Person
77 N83585b3945a8431d9789668345753e00 rdf:first Nd592af056b8a4c868aefeea9b35ee29f
78 rdf:rest Nc65f408db4af473c80536a39ee489caa
79 N846aa2e85eb9443eb69e6120e0d6f623 schema:name Springer Nature
80 rdf:type schema:Organisation
81 N87daa54e0b504866af652c0b453554ea rdf:first N36b9ba56bd8646ffbc9e0e06e9aff3a3
82 rdf:rest N2f0a2d008bf242d78a912ae8780a6465
83 N8e9d988f6cbf4e3185ae3e6d0e0a3aa0 schema:isbn 978-3-319-12642-5
84 978-3-319-12643-2
85 schema:name Neural Information Processing
86 rdf:type schema:Book
87 N9412dc536aa54a62b7537bf16f57a851 schema:familyName Loo
88 schema:givenName Chu Kiong
89 rdf:type schema:Person
90 Nc65f408db4af473c80536a39ee489caa rdf:first Nd8325b19949a4d77b8db1f42d01ef4fd
91 rdf:rest N87daa54e0b504866af652c0b453554ea
92 Ncde7bec94eca48bba48aaa44fbf2c1f4 rdf:first sg:person.012350400311.86
93 rdf:rest rdf:nil
94 Nd592af056b8a4c868aefeea9b35ee29f schema:familyName Yap
95 schema:givenName Keem Siah
96 rdf:type schema:Person
97 Nd8325b19949a4d77b8db1f42d01ef4fd schema:familyName Wong
98 schema:givenName Kok Wai
99 rdf:type schema:Person
100 Nda352b6889694ed187d31afe75fcf099 rdf:first N9412dc536aa54a62b7537bf16f57a851
101 rdf:rest N83585b3945a8431d9789668345753e00
102 Nf7364929c7d44986869f21f9c8eff31d schema:name doi
103 schema:value 10.1007/978-3-319-12643-2_77
104 rdf:type schema:PropertyValue
105 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
106 schema:name Information and Computing Sciences
107 rdf:type schema:DefinedTerm
108 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
109 schema:name Data Format
110 rdf:type schema:DefinedTerm
111 sg:person.010467364517.31 schema:affiliation grid-institutes:grid.19373.3f
112 schema:familyName Yan
113 schema:givenName Xuehu
114 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31
115 rdf:type schema:Person
116 sg:person.011071034626.54 schema:affiliation grid-institutes:grid.19373.3f
117 schema:familyName Niu
118 schema:givenName Xiamu
119 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011071034626.54
120 rdf:type schema:Person
121 sg:person.012350400311.86 schema:affiliation grid-institutes:grid.260567.0
122 schema:familyName Yang
123 schema:givenName Ching-Nung
124 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012350400311.86
125 rdf:type schema:Person
126 sg:person.013117766471.90 schema:affiliation grid-institutes:grid.19373.3f
127 schema:familyName Wang
128 schema:givenName Shen
129 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013117766471.90
130 rdf:type schema:Person
131 grid-institutes:grid.19373.3f schema:alternateName School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China
132 schema:name School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China
133 rdf:type schema:Organization
134 grid-institutes:grid.260567.0 schema:alternateName Department of CSIE, National Dong Hwa University, 974, Hualien, Taiwan
135 schema:name Department of CSIE, National Dong Hwa University, 974, Hualien, Taiwan
136 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...