Results 1 to 10 of about 30,954 (223)
Some of the next articles are maybe not open access.
Braille for Visual Cryptography
2014 IEEE International Symposium on Multimedia, 2014Visual Cryptography (VC) has been studied as a significant way of information security. In VC, original secret is divided into two images called shares. VC shares show no clue for secret perceptually, whereas participants are able to obtain the secret by simply superimposing the shares. Despite the obvious advantages of VC in crucial secret protection,
Guangyu Wang, Feng Liu, Wei Qi Yan
openaire +1 more source
Structure Aware Visual Cryptography
Computer Graphics Forum, 2014AbstractVisual cryptography is an encryption technique that hides a secret image by distributing it between some shared images made up of seemingly random black‐and‐white pixels. Extended visual cryptography (EVC) goes further in that the shared images instead represent meaningful binary pictures. The original approach to EVC suffered from low contrast,
Bin Liu +3 more
openaire +1 more source
Collaborative Visual Cryptography Schemes
IEEE Transactions on Circuits and Systems for Video Technology, 2018A ( $k,n$ )-conventional visual cryptography (VC) scheme is designed to share one secret and each participant takes one share. When some common participants are involved in multiple VC schemes for multiple secrets, each needs to take multiple shares. This procedure needs more shares, which is inconvenient.
Xingxing Jia +3 more
openaire +2 more sources
Indirect visual cryptography scheme
SPIE Proceedings, 2015Visual cryptography (VC), a new cryptographic scheme for image. Here in encryption, image with message is encoded to be N sub-images and any K sub-images can decode the message in a special rules (N>=2 ...
Xiubo Yang, Tuo Li, Yishi Shi
openaire +1 more source
Visual cryptography via halftoning
SPIE Proceedings, 2003Visual cryptography encodes a secret binary image SI into n shares of random binary patterns. The secret image can be visually decoded by superimposing a qualified subset of shares, but no secret information can be obtained from the superposition of a forbidden subset. Such a scheme is mathematically secure, however, the binary patterns of the n shares
Gonzalo R. Arce +2 more
openaire +1 more source
Tracking-Tolerant Visual Cryptography
2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), 2019We introduce a novel secure display system, which uses visual cryptography [4] with tolerance for tracking. Our system brings cryptographic privacy from text to virtual worlds [3]. Much like traditional encryption that uses a public key and a private key, our system uses two images that are both necessary for visual decryption of the data.
Ruofei Du, Eric Lee, Amitabh Varshney
openaire +1 more source
Single-pixel Visual Cryptography
Frontiers in Optics / Laser Science, 2020Two novel visual cryptography (VC) schemes are proposed by combining VC with single-pixel imaging (SPI) for the first time. VC can be optically implemented in both object images and illumination patterns.
Shuming Jiao +4 more
openaire +1 more source
Applications of visual cryptography
International Journal of Parallel, Emergent and Distributed Systems, 2011Visual cryptography is a secret sharing scheme with only few known applications. This paper first modifies visual cryptography techniques to make them suitable for applications and then proposes some applications that use the modified techniques. These applications are secured communication system that are used to broadcast one or more secrets, multi ...
Subba Rao V. Yengisetty, Bimal K. Roy
openaire +1 more source
Various Visual Cryptography Schemes
2014Stemmed from traditional visual cryptography, more visual cryptography schemes have been developed and will be introduced in this chapter. The schemes include the extended visual cryptography, probabilistic visual cryptography, size-invariant visual cryptography, XOR-based visual cryptography, and a secret-enhanced visual cryptography.
Feng Liu, Wei Qi Yan
openaire +1 more source
On visual cryptography schemes
1998 Information Theory Workshop (Cat. No.98EX131), 2002We consider visual cryptography schemes in which two pixels combine in an arbitrary way. We analyze the pixel expansion and the contrast of (2,n)-threshold visual cryptography schemes, that is schemes in which any pair of n shares can visually reconstruct the secret image, but any single share has no information on the secret image.
openaire +1 more source

