Results 1 to 10 of about 30,954 (223)
Some of the next articles are maybe not open access.

Braille for Visual Cryptography

2014 IEEE International Symposium on Multimedia, 2014
Visual Cryptography (VC) has been studied as a significant way of information security. In VC, original secret is divided into two images called shares. VC shares show no clue for secret perceptually, whereas participants are able to obtain the secret by simply superimposing the shares. Despite the obvious advantages of VC in crucial secret protection,
Guangyu Wang, Feng Liu, Wei Qi Yan
openaire   +1 more source

Structure Aware Visual Cryptography

Computer Graphics Forum, 2014
AbstractVisual cryptography is an encryption technique that hides a secret image by distributing it between some shared images made up of seemingly random black‐and‐white pixels. Extended visual cryptography (EVC) goes further in that the shared images instead represent meaningful binary pictures. The original approach to EVC suffered from low contrast,
Bin Liu   +3 more
openaire   +1 more source

Collaborative Visual Cryptography Schemes

IEEE Transactions on Circuits and Systems for Video Technology, 2018
A ( $k,n$ )-conventional visual cryptography (VC) scheme is designed to share one secret and each participant takes one share. When some common participants are involved in multiple VC schemes for multiple secrets, each needs to take multiple shares. This procedure needs more shares, which is inconvenient.
Xingxing Jia   +3 more
openaire   +2 more sources

Indirect visual cryptography scheme

SPIE Proceedings, 2015
Visual cryptography (VC), a new cryptographic scheme for image. Here in encryption, image with message is encoded to be N sub-images and any K sub-images can decode the message in a special rules (N>=2 ...
Xiubo Yang, Tuo Li, Yishi Shi
openaire   +1 more source

Visual cryptography via halftoning

SPIE Proceedings, 2003
Visual cryptography encodes a secret binary image SI into n shares of random binary patterns. The secret image can be visually decoded by superimposing a qualified subset of shares, but no secret information can be obtained from the superposition of a forbidden subset. Such a scheme is mathematically secure, however, the binary patterns of the n shares
Gonzalo R. Arce   +2 more
openaire   +1 more source

Tracking-Tolerant Visual Cryptography

2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), 2019
We introduce a novel secure display system, which uses visual cryptography [4] with tolerance for tracking. Our system brings cryptographic privacy from text to virtual worlds [3]. Much like traditional encryption that uses a public key and a private key, our system uses two images that are both necessary for visual decryption of the data.
Ruofei Du, Eric Lee, Amitabh Varshney
openaire   +1 more source

Single-pixel Visual Cryptography

Frontiers in Optics / Laser Science, 2020
Two novel visual cryptography (VC) schemes are proposed by combining VC with single-pixel imaging (SPI) for the first time. VC can be optically implemented in both object images and illumination patterns.
Shuming Jiao   +4 more
openaire   +1 more source

Applications of visual cryptography

International Journal of Parallel, Emergent and Distributed Systems, 2011
Visual cryptography is a secret sharing scheme with only few known applications. This paper first modifies visual cryptography techniques to make them suitable for applications and then proposes some applications that use the modified techniques. These applications are secured communication system that are used to broadcast one or more secrets, multi ...
Subba Rao V. Yengisetty, Bimal K. Roy
openaire   +1 more source

Various Visual Cryptography Schemes

2014
Stemmed from traditional visual cryptography, more visual cryptography schemes have been developed and will be introduced in this chapter. The schemes include the extended visual cryptography, probabilistic visual cryptography, size-invariant visual cryptography, XOR-based visual cryptography, and a secret-enhanced visual cryptography.
Feng Liu, Wei Qi Yan
openaire   +1 more source

On visual cryptography schemes

1998 Information Theory Workshop (Cat. No.98EX131), 2002
We consider visual cryptography schemes in which two pixels combine in an arbitrary way. We analyze the pixel expansion and the contrast of (2,n)-threshold visual cryptography schemes, that is schemes in which any pair of n shares can visually reconstruct the secret image, but any single share has no information on the secret image.
openaire   +1 more source

Home - About - Disclaimer - Privacy