Results 1 to 10 of about 2,287,880 (206)
A QR code-based user-friendly visual cryptography scheme [PDF]
Benefiting from the development of the Internet and smart devices, it is now convenient to transmit images anywhere and anytime, which poses a new challenge for image security.
Lijing Ren, Denghui Zhang
semanticscholar +3 more sources
Meta-optics empowered vector visual cryptography for high security and rapid decryption [PDF]
Optical encryption is a promising approach to protecting secret information owing to the advantages of low-power consumption, parallel, high-speed, and multi-dimensional processing capabilities. Nevertheless, conventional strategies generally suffer from
Fei Zhang +9 more
semanticscholar +2 more sources
In this paper, we propose a Visual Cryptographic system which can be used to hide the original image information from an intruder or an unwanted user. The images can be in any standard format. The encrypted image is sent to the destination through the network and then the image is decrypted. We have used Symmetric-key cryptography.
null Ashutosh, Sayan Dev Sen
semanticscholar +3 more sources
Privacy Protection of Digital Images Using Watermarking and QR Code-based Visual Cryptography
The increase in information sharing in terms of digital images imposes threats to privacy and personal identity. Digital images can be stolen while in transfer and any kind of alteration can be done very easily. Thus, privacy protection of digital images
Akanksha Arora, H. Garg, S. Shivani
semanticscholar +2 more sources
A Privacy‐Preserving Biometric Recognition System with Visual Cryptography
The popularity of more powerful and smarter digital devices has improved the quality of life and poses new challenges to the privacy protection of personal information.
Lijing Ren, Denghui Zhang
semanticscholar +2 more sources
Subliminal Channels in Visual Cryptography
This paper describes three methods of creating a subliminal channel in visual cryptography that are defined for a (2,2) sharing scheme. They work by hiding additional covert information besides the original encrypted image.
Katarzyna Koptyra, M. Ogiela
semanticscholar +3 more sources
An optimization of color halftone visual cryptography scheme based on Bat algorithm
Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of
Firas Mohammed Aswad +2 more
semanticscholar +2 more sources
Lossless sharing visual cryptography
According to the information loss during the secret image sharing process, the lossless sharing visual crypto-graphy was proposed. The optimizations of two parameters were simplified into one parameter. The matrices translation algorithm and the integer programming model were designed.
Bin YU, Zheng-xin FU
doaj +4 more sources
The development of mobile Internet and the popularization of intelligent sensor devices greatly facilitate the generation and transmission of massive multimedia data including medical images and pathological models on the open network.
Denghui Zhang +3 more
semanticscholar +1 more source
A Novel Color Visual Cryptography Approach Based on Harris Hawks Optimization Algorithm
Hundreds of millions of people worldwide use computing devices and services, including smartphones, laptops, and messaging apps. Visual cryptography (VC) is one of the most secure encryption methods for image encryption in many applications, such as ...
Dyala R. Ibrahim +4 more
semanticscholar +1 more source

