Results 131 to 140 of about 2,287,880 (206)
Some of the next articles are maybe not open access.
Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429), 2004
Visual cryptography encodes a secret binary image (SI) into n shares of random binary patterns. If the shares are xeroxed onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset.
Zhi, Zhou +2 more
openaire +2 more sources
Visual cryptography encodes a secret binary image (SI) into n shares of random binary patterns. If the shares are xeroxed onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset.
Zhi, Zhou +2 more
openaire +2 more sources
J. Electronic Imaging, 2022
. Due to a growth in information sharing and the use of multiple digital technologies, human lifestyles have been delivered into the virtual world. This digital world has seen the use of images in special fields increase dramatically, especially in ...
N. Rajesh Kumar +4 more
semanticscholar +1 more source
. Due to a growth in information sharing and the use of multiple digital technologies, human lifestyles have been delivered into the virtual world. This digital world has seen the use of images in special fields increase dramatically, especially in ...
N. Rajesh Kumar +4 more
semanticscholar +1 more source
An Approach for Securing QR code using Cryptography and Visual Cryptography
2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES), 2022Quick Response code (QR code) is a 2-D matrix barcode which stores data in four different encoding modes (numeric, alphanumeric, kanji, binary). They are widely used nowadays and can be seen almost everywhere whether it is on cosmetics products, general ...
Cheshtaa Bhardwaj +2 more
semanticscholar +1 more source
Cybernetics and systems, 2022
Visual cryptography is a cryptographic method that encrypts visual facts and the information decrypted appears as an original visual image. Here, the confidential data is shared by dividing the visual details into multiple shares such that the encryption
Arvind Singh Choudhary, Manoj Kumar
semanticscholar +1 more source
Visual cryptography is a cryptographic method that encrypts visual facts and the information decrypted appears as an original visual image. Here, the confidential data is shared by dividing the visual details into multiple shares such that the encryption
Arvind Singh Choudhary, Manoj Kumar
semanticscholar +1 more source
Enhancing Security of Image Steganography Using Visual Cryptography
2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), 2021Steganography is the art of hiding secret data in a medium whereas visual-cryptography is a cryptographic technique where a full image is encrypted. The security of image steganography depends on the secret key set which is used for embedding the secret ...
Muhammad Aminul Islam +2 more
semanticscholar +1 more source
Cheating in Visual Cryptography
Designs, Codes and Cryptography, 2006zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Horng, Gwoboa +2 more
openaire +2 more sources
Probabilistic Visual Cryptography Schemes
The Computer Journal, 2005Visual cryptography schemes allow the encoding of a secret image, consisting of black or white pixels, into n shares which are distributed to the participants. The shares are such that only qualified subsets of participants can 'visually' recover the secret image.
CIMATO S +2 more
openaire +4 more sources
Size Invariant Visual Cryptography Schemes With Evolving Threshold Access Structures
IEEE transactions on multimediaIn this research, we consider the evolving threshold access structure, denoted as $(k, \infty)$, for size invariant visual cryptography scheme (SIVCS). The so-called $(k, \infty)$ threshold indicates the number of participants is supposed to be infinite ...
Xiaotian Wu, Xinjie Feng
semanticscholar +1 more source
IEEE Signal Processing Letters, 2011
This letter presents a method for implementing visual cryptography (VC) in which an additional tag is attached to each generated share. The proposed (t, n), 2 ≤ t ≤ n tagged visual cryptography (TVC) scheme works like a traditional VC scheme does, where the original image is encoded in n shares in such a way that the secret can be revealed by ...
null Ran-Zan Wang, null Shuo-Fang Hsu
openaire +1 more source
This letter presents a method for implementing visual cryptography (VC) in which an additional tag is attached to each generated share. The proposed (t, n), 2 ≤ t ≤ n tagged visual cryptography (TVC) scheme works like a traditional VC scheme does, where the original image is encoded in n shares in such a way that the secret can be revealed by ...
null Ran-Zan Wang, null Shuo-Fang Hsu
openaire +1 more source
2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON)
Visual cryptography (VC) designed to secure visual information such as images and text by dividing it into multiple shares. A key advantage of visual cryptography is its ability to decrypt information without the need for computational devices, using ...
Prajna Aasritha Adabala +4 more
semanticscholar +1 more source
Visual cryptography (VC) designed to secure visual information such as images and text by dividing it into multiple shares. A key advantage of visual cryptography is its ability to decrypt information without the need for computational devices, using ...
Prajna Aasritha Adabala +4 more
semanticscholar +1 more source

