Reference Hub25
Exploiting the Homomorphic Property of Visual Cryptography

Exploiting the Homomorphic Property of Visual Cryptography

Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu
Copyright: © 2017 |Volume: 9 |Issue: 2 |Pages: 12
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781522512288|DOI: 10.4018/IJDCF.2017040105
Cite Article Cite Article

MLA

Yan, Xuehu, et al. "Exploiting the Homomorphic Property of Visual Cryptography." IJDCF vol.9, no.2 2017: pp.45-56. http://doi.org/10.4018/IJDCF.2017040105

APA

Yan, X., Lu, Y., Liu, L., Wan, S., Ding, W., & Liu, H. (2017). Exploiting the Homomorphic Property of Visual Cryptography. International Journal of Digital Crime and Forensics (IJDCF), 9(2), 45-56. http://doi.org/10.4018/IJDCF.2017040105

Chicago

Yan, Xuehu, et al. "Exploiting the Homomorphic Property of Visual Cryptography," International Journal of Digital Crime and Forensics (IJDCF) 9, no.2: 45-56. http://doi.org/10.4018/IJDCF.2017040105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this paper, homomorphic visual cryptographic scheme (HVCS) is proposed. The proposed HVCS inherits the good features of traditional VCS, such as, loss-tolerant (e.g., (k, n) threshold) and simply reconstructed method, where simply reconstructed method means that the decryption of the secret image is based on human visual system (HVS) without any cryptographic computation. In addition, the proposed HVCS can support signal processing in the encrypted domain (SPED), e.g., homomorphic operations and authentication, which can protect the user's privacy as well as improve the security in some applications, such as, cloud computing and so on. Both the theoretical analysis and simulation results demonstrate the effectiveness and security of the proposed HVCS.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.