Visual secret checking refers to the superimposition of one key image and another public sharing image without auxiliary automated computation, in order to recognize the specified secret via human inspection. This paper achieves the goals of: guaranteeing that the related contents of a secret are not revealed after any public sharing image superimposition, confirming the accuracy of any public sharing image, and providing for the ease of management of various types of sharing images. When a user is outside of a computer environment, he/she can utilize the proposed method to discern the contents of the secret independently. Furthermore, the key image and all the sharing images have the same meaning, visible upon inspection, which allows for effective data management and classification. Through an exposition of the relevant theory, as well as experimentation, this paper provides evidence for the above claims.
All Science Journal Classification (ASJC) codes
- Numerical Analysis
- Computer Science Applications
- Computational Theory and Mathematics
- Applied Mathematics