List of Tables

3.1   Encoding a binary pixel p into two shares s1 and s2   60

3.2   Implementing the visual one secret sharing scheme with a pixel expansion of 4   60

3.3   Wu and Chen’s encoding scheme for visual two-secret sharing in two shares   63

3.4   Wu and Chang’s encoding scheme for visual two-secret sharing in two shares   67

3.5   Encoding a set of corresponding pixels (p1,p2,p3)j1 into aj1 (aj2 and aj3) and bj1 in terms of sA1 (sA3,sA1, respectively) and sB in the first chords of A and B, respectively for visual 3-secret sharing.   73

3.6   Encoding a set of corresponding pixels (p1,p2,p3)j2 into aj2 (aj3 and aj1) and bj2 in terms of sA2 (sA2,sA1, respectively) and sB in the first chords of A and B, respectively for visual 3-secret sharing.   76

3.7   Encoding scheme equivalent to Table 6 for the second chords of A and B for visual 3-secret sharing   77

3.8   Encoding a set of corresponding pixels (p1,p2,p3)j3 into aj3 (aj1 and aj2) and bj3 in terms of sA3 (sA1,sA2, respectively) and sB in the first chords of A and B, respectively for visual 3-secret sharing.   78

3.9   Possible set of encoded patterns for sA1,sA2,sA3, and sB; and their stacked results for x = 3   84

3.10   Comparison of visual multiple secrets sharing schemes   90

4.1   Comparison of visual cryptography schemes   108

4.2   Approaches to photograph visual cryptography   110

5.1   Values of β for scheme S′ for n = 3. The max over each row is in boldface   146

5.2   Values of β for n = 4. The max over each row is in boldface   146

5.3   Values of β for n = 5. The max over each row is in boldface and ∊1 and ∊2 denote very small values   147

6.1   Distribution phase of (2, 4)-VCS using Yang et al.’s [25] algorithm   170

6.2   Reconstruction of participant 1 and 2 using Yang et al.’s [25] algorithm   170

6.3   Reconstruction of participant 3 and 4 using Yang et al.’s [25] algorithm   170

6.4   Distribution phase of the visual cryptography with minimal access structure Γ0 = {{1, 2}, {1, 3}, {2, 3}} using Hu and Tzeng [?] algorithm   173

6.5   Reconstruction of participant 1 and 2 using Hu and Tzeng [10] algorithm   174

6.6   Reconstruction of participant 1 and 3 using Hu and Tzeng [10] algorithm   174

6.7   Reconstruction of participant 2 and 3 using Hu and Tzeng [10] algorithm   174

7.1   Results of the superimposition of two random pixels   187

7.2   Encoding b into r1 and r2 and results of s = r1r2 by Algorithms 1, 2, and 3.   192

7.3   Light contrasts by Algorithms 1–3 in producing VCRG-2   196

7.4   All possible combinations of b, r1, and r2, the corresponding results of a1 (= r1), a2 = f (r2, a1), r3 = f (b, a2), and r1r2, r1r3, r2r3 as well as r1r2r3 by Algorithm 4 for (3, 3)-VCRG   203

7.5   Light transmissions of the corresponding pixels in Table 7.3.   204

7.6   Light contrasts by Algorithms 4–6 for ( n, n)-VCRG.   206

7.7   Comparison of pixel expansions for conventional (n, n) visual cryptographic and (n, n)-VCRG schemes   219

9.1   Comparison between VCSs with reversing based on perfect black VCSs   276

10.1   Comparisons of different cheating prevention visual secret sharing schemes   295

11.1   The advantages and disadvantages of large and small subpixels   298

11.2   The probability of the four patterns appearing at the columns i and i + 1 in the collections C0 and C1   307

11.3   The properties of the misaligned schemes   313

11.4   The relation of the ratios RC,c and RC, c   317

11.5   The advantages and disadvantages of large and small subpixels   319

15.1   PSNR comparisons for past schemes and our scheme   419

15.2   PSNR measurements when embedding the two target secret images in Figure 15.5 (a) and (b) comparisons for past schemes and our scheme   421

15.3   PSNR comparisons with the Lin-Tsai scheme   421

15.4   PSNR comparisons with the Lin-Tsai scheme   423

16.1   The cover-to-secret image size ratios of the existing schemes and the proposed scheme   458

16.2   The detection ratios of different schemes   458

17.1   Pixel expansions, file sizes of shadows, and contrasts of the previewed images for some (k, n)-TiOISSSs   482

17.2   A comparison among three TiOISSSs   484

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.17.75.227