Data hiding in halftone images using mathematical morphology and conjugate ordered dithering

Satvik Sachdev, Aparna Nayak, Tribikram Pradhan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Visual Cryptography (VC) is a cryptographic technique that allows visual information such as textual images, handwritten notes etc to be encrypted in such a way that the decryption can be performed using the human visual system i.e. eyes. Here we propose an algorithm for data hiding in halftone images. This algorithm uses a morphological operation and ordered dithering, and is a modified version of DHCOD[1].In this paper we focus on improving the security and robustness of shares in VC and generating more meaningful shares with respect to basic cryptographic scheme.

Original languageEnglish
Title of host publication2014 International Conference on High Performance Computing and Applications, ICHPCA 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479959587
DOIs
Publication statusPublished - 18-02-2015
Event2014 International Conference on High Performance Computing and Applications, ICHPCA 2014 - Bhubaneswar, India
Duration: 22-12-201424-12-2014

Conference

Conference2014 International Conference on High Performance Computing and Applications, ICHPCA 2014
CountryIndia
CityBhubaneswar
Period22-12-1424-12-14

Fingerprint

Mathematical morphology
Cryptography

All Science Journal Classification (ASJC) codes

  • Software

Cite this

Sachdev, S., Nayak, A., & Pradhan, T. (2015). Data hiding in halftone images using mathematical morphology and conjugate ordered dithering. In 2014 International Conference on High Performance Computing and Applications, ICHPCA 2014 [7045304] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICHPCA.2014.7045304
Sachdev, Satvik ; Nayak, Aparna ; Pradhan, Tribikram. / Data hiding in halftone images using mathematical morphology and conjugate ordered dithering. 2014 International Conference on High Performance Computing and Applications, ICHPCA 2014. Institute of Electrical and Electronics Engineers Inc., 2015.
@inproceedings{754e4043eabe4334a1fed12d9644ca9e,
title = "Data hiding in halftone images using mathematical morphology and conjugate ordered dithering",
abstract = "Visual Cryptography (VC) is a cryptographic technique that allows visual information such as textual images, handwritten notes etc to be encrypted in such a way that the decryption can be performed using the human visual system i.e. eyes. Here we propose an algorithm for data hiding in halftone images. This algorithm uses a morphological operation and ordered dithering, and is a modified version of DHCOD[1].In this paper we focus on improving the security and robustness of shares in VC and generating more meaningful shares with respect to basic cryptographic scheme.",
author = "Satvik Sachdev and Aparna Nayak and Tribikram Pradhan",
year = "2015",
month = "2",
day = "18",
doi = "10.1109/ICHPCA.2014.7045304",
language = "English",
booktitle = "2014 International Conference on High Performance Computing and Applications, ICHPCA 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

Sachdev, S, Nayak, A & Pradhan, T 2015, Data hiding in halftone images using mathematical morphology and conjugate ordered dithering. in 2014 International Conference on High Performance Computing and Applications, ICHPCA 2014., 7045304, Institute of Electrical and Electronics Engineers Inc., 2014 International Conference on High Performance Computing and Applications, ICHPCA 2014, Bhubaneswar, India, 22-12-14. https://doi.org/10.1109/ICHPCA.2014.7045304

Data hiding in halftone images using mathematical morphology and conjugate ordered dithering. / Sachdev, Satvik; Nayak, Aparna; Pradhan, Tribikram.

2014 International Conference on High Performance Computing and Applications, ICHPCA 2014. Institute of Electrical and Electronics Engineers Inc., 2015. 7045304.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Data hiding in halftone images using mathematical morphology and conjugate ordered dithering

AU - Sachdev, Satvik

AU - Nayak, Aparna

AU - Pradhan, Tribikram

PY - 2015/2/18

Y1 - 2015/2/18

N2 - Visual Cryptography (VC) is a cryptographic technique that allows visual information such as textual images, handwritten notes etc to be encrypted in such a way that the decryption can be performed using the human visual system i.e. eyes. Here we propose an algorithm for data hiding in halftone images. This algorithm uses a morphological operation and ordered dithering, and is a modified version of DHCOD[1].In this paper we focus on improving the security and robustness of shares in VC and generating more meaningful shares with respect to basic cryptographic scheme.

AB - Visual Cryptography (VC) is a cryptographic technique that allows visual information such as textual images, handwritten notes etc to be encrypted in such a way that the decryption can be performed using the human visual system i.e. eyes. Here we propose an algorithm for data hiding in halftone images. This algorithm uses a morphological operation and ordered dithering, and is a modified version of DHCOD[1].In this paper we focus on improving the security and robustness of shares in VC and generating more meaningful shares with respect to basic cryptographic scheme.

UR - http://www.scopus.com/inward/record.url?scp=84925430893&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84925430893&partnerID=8YFLogxK

U2 - 10.1109/ICHPCA.2014.7045304

DO - 10.1109/ICHPCA.2014.7045304

M3 - Conference contribution

BT - 2014 International Conference on High Performance Computing and Applications, ICHPCA 2014

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Sachdev S, Nayak A, Pradhan T. Data hiding in halftone images using mathematical morphology and conjugate ordered dithering. In 2014 International Conference on High Performance Computing and Applications, ICHPCA 2014. Institute of Electrical and Electronics Engineers Inc. 2015. 7045304 https://doi.org/10.1109/ICHPCA.2014.7045304