Abstract

To evaluate the visual quality in visual secret sharing schemes, most of the existing metrics fail to generate fair and uniform quality scores for tested reconstructed images. We propose a new approach to measure the visual quality of the reconstructed image for visual secret sharing schemes. We developed an object detection method in the context of secret sharing, detecting outstanding local features and global object contour. The quality metric is constructed based on the object detection-weight map. The effectiveness of the proposed quality metric is demonstrated by a series of experiments. The experimental results show that our quality metric based on secret object detection outperforms existing metrics. Furthermore, it is straightforward to implement and can be applied to various applications such as performing the security test of the visual secret sharing process.

Highlights

  • IntroductionNamed visual cryptography, encrypts the secret image by generating random-looking shares

  • Visual secret sharing, named visual cryptography, encrypts the secret image by generating random-looking shares

  • We proposed a novel metric to measure the visual quality of the reconstructed image for visual secret sharing

Read more

Summary

Introduction

Named visual cryptography, encrypts the secret image by generating random-looking shares. The quality of the reconstructed image is one of the most important issues of visual secret sharing. Other scholars [7, 8] have used some well-known image quality metrics such as peak signal-to-noise ratio (PSNR) and mean squared error (MSE) to test the difference between the reconstruction image and secret image. We proposed a novel metric to measure the visual quality of the reconstructed image for visual secret sharing.

Visual secret sharing schemes and existing quality metrics
Outstanding local feature detection model: visual saliency
Basic flow of the object detection for visual secret sharing
Performance analysis of object detection in the context of secret sharing
Quality assessment based on secret object detection
Findings
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.