Double Visual Cryptography Using Generalized Tent Map, Rotation, and Image Filtering

This paper introduces a Multi-Visual Cryptography (MVC) system for sharing two color images, where the secrets can be revealed with low computation power using all the shares. The system uses the generalized Tent map as a source of randomness to generate any number of random shares. More specifically, (n-1) random shares are generated, and then, the nth share is calculated from the random shares and the secrets using rotations of the shares. In recovery, rotation of the last share recovers the two images based on the angle of rotation. Half the number of pixels is recovered for each secret image, whereas a modified weighted average filter is used to improve the quality of the recovered images significantly. The system does not use halftone images and produces shares of the same size as the secrets without pixel expansion or auxiliary data. The proposed system is efficient, passed several security tests, and is compared to recent works. © 2023 IEEE.

A (k,n)-Secret Image Sharing With Steganography Using Generalized Tent Map

Secret Image Sharing (SIS) transfers an image to mutually suspicious receivers as n meaningless shares, where k or more shares must be present to recover the secret. This paper proposes a (k, n)-SIS system for any image type using polynomial interpolation based on Lagrange polynomials, where the generated shares are of size 1/k of the secret image size. A full encryption system, consisting of substitution and permutation stages, is employed by using the generalized Tent map as a source of randomness. In addition to using a long and sensitive system key, steganography using the Least Significant Bits (LSBs) embedding technique is utilized to improve security. Detailed experimental analysis of the security, robustness and performance of the proposed system is provided, which is more comprehensive than the analyses given in other related works. Security is demonstrated using statistical tests, and robustness against noise and crop attacks is validated. © 2024 IEEE.

Novel Fast Prediction Algorithm for Advanced and High Efficiency Video Coding

This paper introduces an efficient prediction algorithm tailored for advanced and high efficiency video coding, encompassing both H.264 and H.265. The proposed approach aims at replacing the standard intra prediction methodology by employing a streamlined prediction mode, which significantly reduces computational overhead and system complexity while eliminating the requirement for mode decision. By leveraging block comparison criteria, the designed method combines neighboring blocks in a linear fashion to accurately represent the target block. Extensive comparisons are conducted with the H.264 intra prediction using various video sequences and multiple evaluation criteria. The results demonstrate substantial time savings of up to 60% compared to the H.264 standard intra prediction algorithm, with a minor peak signal-to-noise ratio drop. The proposed algorithm holds promise for enhancing real-time video processing and compression in video coding systems, offering notable efficiency gains without sacrificing predictive accuracy. © 2024 IEEE.

A Secured Lossless Visual Secret Sharing for Color Images Using Arnold Transform

Nowadays, with the rapid growth in information, a fast and secure method is eagerly needed to share images. (n, n)-Visual Secret Sharing (VSS) is used to share a secret image into n shares, where the secret can only be recovered using all the n shares and the recovery must be fast with low computational complexity. This paper proposes a secured lossless (n, n)-VSS system based on Arnold transform and pixel vectorization suitable to be used with binary, grayscale and color images. Multiple security tests were performed such as entropy, correlation, Mean Squared Error (MSE), National Institute of Standards and Technology (NIST) SP-800-22 statistical suite, and differential attacks, which demonstrate the good security of the proposed system. In addition, the time complexity and runtime of the recovery system indicate good efficiency. © 2022 IEEE.