Results 1 to 10 of about 2,287,880 (206)

A QR code-based user-friendly visual cryptography scheme [PDF]

open access: yesScientific Reports, 2022
Benefiting from the development of the Internet and smart devices, it is now convenient to transmit images anywhere and anytime, which poses a new challenge for image security.
Lijing Ren, Denghui Zhang
semanticscholar   +3 more sources

Meta-optics empowered vector visual cryptography for high security and rapid decryption [PDF]

open access: yesNat Commun, 2023
Optical encryption is a promising approach to protecting secret information owing to the advantages of low-power consumption, parallel, high-speed, and multi-dimensional processing capabilities. Nevertheless, conventional strategies generally suffer from
Fei Zhang   +9 more
semanticscholar   +2 more sources

Visual Cryptography

open access: yes2008 International Conference on Advanced Computer Theory and Engineering, 2008
In this paper, we propose a Visual Cryptographic system which can be used to hide the original image information from an intruder or an unwanted user. The images can be in any standard format. The encrypted image is sent to the destination through the network and then the image is decrypted. We have used Symmetric-key cryptography.
null Ashutosh, Sayan Dev Sen
semanticscholar   +3 more sources

Privacy Protection of Digital Images Using Watermarking and QR Code-based Visual Cryptography

open access: yesAdvances in Multimedia, 2023
The increase in information sharing in terms of digital images imposes threats to privacy and personal identity. Digital images can be stolen while in transfer and any kind of alteration can be done very easily. Thus, privacy protection of digital images
Akanksha Arora, H. Garg, S. Shivani
semanticscholar   +2 more sources

A Privacy‐Preserving Biometric Recognition System with Visual Cryptography

open access: yesAdvances in Multimedia, 2022
The popularity of more powerful and smarter digital devices has improved the quality of life and poses new challenges to the privacy protection of personal information.
Lijing Ren, Denghui Zhang
semanticscholar   +2 more sources

Subliminal Channels in Visual Cryptography

open access: yesCryptography, 2022
This paper describes three methods of creating a subliminal channel in visual cryptography that are defined for a (2,2) sharing scheme. They work by hiding additional covert information besides the original encrypted image.
Katarzyna Koptyra, M. Ogiela
semanticscholar   +3 more sources

An optimization of color halftone visual cryptography scheme based on Bat algorithm

open access: yesJournal of Intelligent Systems, 2021
Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of
Firas Mohammed Aswad   +2 more
semanticscholar   +2 more sources

Lossless sharing visual cryptography

open access: yesTongxin xuebao, 2013
According to the information loss during the secret image sharing process, the lossless sharing visual crypto-graphy was proposed. The optimizations of two parameters were simplified into one parameter. The matrices translation algorithm and the integer programming model were designed.
Bin YU, Zheng-xin FU
doaj   +4 more sources

A Privacy Protection Framework for Medical Image Security without Key Dependency Based on Visual Cryptography and Trusted Computing

open access: yesComputational Intelligence and Neuroscience, 2023
The development of mobile Internet and the popularization of intelligent sensor devices greatly facilitate the generation and transmission of massive multimedia data including medical images and pathological models on the open network.
Denghui Zhang   +3 more
semanticscholar   +1 more source

A Novel Color Visual Cryptography Approach Based on Harris Hawks Optimization Algorithm

open access: yesSymmetry, 2023
Hundreds of millions of people worldwide use computing devices and services, including smartphones, laptops, and messaging apps. Visual cryptography (VC) is one of the most secure encryption methods for image encryption in many applications, such as ...
Dyala R. Ibrahim   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy