Enter your keyword

2-s2.0-85050513439

[vc_empty_space][vc_empty_space]

Visual Cryptography of Animated GIF Image Based on XOR Operation

Munir R.a

a School of Electrical Engineering and Informatics, Institut Teknologi Bandung (ITB), Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2017 IEEE.This paper describes application of a secret colour image sharing scheme based on XOR operation to the animated GIF images. The scheme is performed without expanding every pixel in the secret image so that size of shared images are equal to size of the secret images. Originally the scheme supports RGB images. In this paper we apply the scheme to the animated GIF image. A GIF image consists of a color palette and a matrix which entries (pixel values) refer to the palette row. XOR operation is not performed to RGB palette of GIF image, but to the matrix. The scheme is applied to each frame of the animated GIF image. As a result, each participant has his (or her) own share, each share is an animated GIF image where the frames look like the random images. The experiment shows that the scheme could be applied to the animated GIF image well. The original animated GIF image could be reconstructed exactly.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]animated GIF image,Color images,Color palette,frame,Pixel values,Secret images,Visual cryptography,XOR operation[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]animated GIF image,frame,secret color image sharing,XOR operation[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ACOMP.2017.14[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]