Table 3: Functionality comparison between the proposed system and the state-of-the-art-works.
Type of Algorithm Information Encryption/Decryption Target Search Sensors Moving System
Pahuja et al. (Pahuja and Kasana, 2017) Visual Cryptography Yes No N/A No
Alex et al. (Alex and Anbarasi, 2011) Visual Cryptography Yes No N/A No
Balclar et al. (Balclar et al., 2017) SLAM No No RGBD Camera + laser range finder Yes
Li et al. (Li et al., 2016) SLAM No No RGBD Camera Yes
Walas et al. (Walas et al., 2016) SLAM No No RGBD Camera + time of flight camera Yes
Proposed System Visual Cryptography + SLAM Yes Yes RGB Camera + Ultrasonic Sensors Yes
imental environment.
REFERENCES
Alex, N. S. and Anbarasi, L. J. (2011). Enhanced image
secret sharing via error diffusion in halftone visual
cryptography. In 2011 3rd International Conference
on Electronics Computer Technology, volume 2, pages
393–397.
Avola, D., Foresti, G. L., Cinque, L., Massaroni, C., Vi-
tale, G., and Lombardi, L. (2016). A multipurpose au-
tonomous robot for target recognition in unknown en-
vironments. In 2016 IEEE 14th International Confer-
ence on Industrial Informatics (INDIN), pages 766–
771.
Avola, D., Foresti, G. L., Martinel, N., Micheloni, C., Pan-
none, D., and Piciarelli, C. (2017a). Aerial video
surveillance system for small-scale uav environment
monitoring. In 2017 14th IEEE International Con-
ference on Advanced Video and Signal Based Surveil-
lance (AVSS), pages 1–6.
Avola, D., Foresti, G. L., Martinel, N., Micheloni, C., Pan-
none, D., and Piciarelli, C. (2017b). Real-Time In-
cremental and Geo-Referenced Mosaicking by Small-
Scale UAVs, pages 694–705. Springer International
Publishing, Cham.
Babu, R., Sridhar, M., and Babu, B. R. (2013). Information
hiding in gray scale images using pseudo-randomized
visual cryptography algorithm for visual information
security. In 2013 International Conference on Infor-
mation Systems and Computer Networks, pages 195–
199.
Balclar, M., Yavuz, S., Amasyal, M. F., Uslu, E., and ak-
mak, F. (2017). R-slam: Resilient localization and
mapping in challenging environments. Robotics and
Autonomous Systems, 87(Supplement C):66 – 80.
Bayer, B. E. (1973). An optimum method for two-level ren-
dition of continuous-tone pictures. In IEEE Int. Conf.
on Communications, volume 26, pages 11–15.
Boiangiu, C.-A., Bucur, I., and Tigora, A. (2012). The im-
age binarization problem revisited: Perspectives and
approaches. Journal of Information Systems & Oper-
ations Management, 6(2):1.
Bu, S., Zhao, Y., Wan, G., and Liu, Z. (2016). Map2dfusion:
Real-time incremental uav image mosaicing based on
monocular slam. In 2016 IEEE/RSJ International
Conference on Intelligent Robots and Systems (IROS),
pages 4564–4571.
Cacace, J., Finzi, A., Lippiello, V., Furci, M., Mimmo, N.,
and Marconi, L. (2016). A control architecture for
multiple drones operated via multimodal interaction
in search rescue mission. In 2016 IEEE International
Symposium on Safety, Security, and Rescue Robotics
(SSRR), pages 233–239.
Camurri, M., Bazeille, S., Caldwell, D. G., and Semini, C.
(2015). Real-time depth and inertial fusion for local
slam on dynamic legged robots. In 2015 IEEE Inter-
national Conference on Multisensor Fusion and Inte-
gration for Intelligent Systems (MFI), pages 259–264.
Chen, L., Sun, L., Yang, T., Fan, L., Huang, K., and
Xuanyuan, Z. (2017). Rgb-t slam: A flexible slam
framework by combining appearance and thermal in-
formation. In 2017 IEEE International Conference on
Robotics and Automation (ICRA), pages 5682–5687.
Hou, Y.-C. (2003). Visual cryptography for color images.
Pattern Recognition, 36(7):1619 – 1629.
Jarvis, J. F., Judice, C. N., and Ninke, W. (1976). A sur-
vey of techniques for the display of continuous tone
pictures on bilevel displays. Computer Graphics and
Image Processing, 5(1):13–40.
Joseph, S. K. and R, R. (2015). Random grid based visual
cryptography using a common share. In 2015 Interna-
tional Conference on Computing and Network Com-
munications (CoCoNet), pages 656–662.
Kadhim, A. and Mohamed, R. M. (2016). Visual cryptog-
raphy for image depend on rsa algamal algorithms. In
2016 Al-Sadeq International Conference on Multidis-
ciplinary in IT and Communication Science and Ap-
plications (AIC-MITCSA), pages 1–6.
Kaur, T. and Kumar, D. (2015). Wireless multifunctional
robot for military applications. In 2015 2nd Interna-
tional Conference on Recent Advances in Engineering
Computational Sciences (RAECS), pages 1–5.
Kim, D. Y., Kim, J., Kim, I., and Jun, S. (2015). Artificial
landmark for vision-based slam of water pipe rehabili-
tation robot. In 2015 12th International Conference on
Ubiquitous Robots and Ambient Intelligence (URAI),
pages 444–446.
Kiyani, M. N. and Khan, M. U. M. (2016). A prototype
of search and rescue robot. In 2016 2nd Interna-
tional Conference on Robotics and Artificial Intelli-
gence (ICRAI), pages 208–213.
Knuth, D. E. (1987). Digital halftones by dot diffusion.
ACM Transactions on Graphics (TOG), 6(4):245–273.
Leonard, J. J. and Durrant-Whyte, H. F. (1991). Simultane-
ous map building and localization for an autonomous
mobile robot. In Intelligent Robots and Systems
’91. ’Intelligence for Mechanical Systems, Proceed-
ings IROS ’91. IEEE/RSJ International Workshop on,
pages 1442–1447 vol.3.
Li, C., Wei, H., and Lan, T. (2016). Research and imple-
mentation of 3d slam algorithm based on kinect depth
ICPRAM 2018 - 7th International Conference on Pattern Recognition Applications and Methods
260