Author

Disa Walden

Abstract

With the growth of digital media, it is becoming more prevalent to find a method to protect the security of that media. An effective method for securely transmitting images is found in the field of Visual Cryptography. While this method is effective for securely transmitting images, many methods have been developed since the first algorithm was proposed in 1994 by Naor and Shamir. A benchmarking scheme is proposed to give the algorithm capabilities, understand the implementation method, evaluate the algorithm development, and provide image reconstruction information. Additionally, the algorithms are ranked according to a Visual Cryptography standard. This would allow an easy way to differentiate between algorithms and determine the ideal algorithm for a given task or project.

Library of Congress Subject Headings

Data encryption (Computer science); Cryptography--Data processing; Computer algorithms--Evaluation; Image processing--Digital techniques

Publication Date

5-16-2012

Document Type

Thesis

Department, Program, or Center

Chester F. Carlson Center for Imaging Science (COS)

Advisor

Dube, Roger

Comments

Note: imported from RIT’s Digital Media Library running on DSpace to RIT Scholar Works. Physical copy available through RIT's The Wallace Library at: QA76.9.A25 W35 2012

Campus

RIT – Main Campus

Share

COinS