Results 141 to 150 of about 2,287,880 (206)
Some of the next articles are maybe not open access.
Copyright protection scheme for color images using extended visual cryptography
Computers & electrical engineering, 2021Most of the existing visual cryptography based copyright protection schemes create random looking shares which can create suspicion of some secret information being shared.
Sonal Kukreja +2 more
semanticscholar +1 more source
IEEE transactions on circuits and systems for video technology (Print)
Video watermarking based on frequency domain is proved to have good invisibility and robustness. However, most of the existing video watermarking schemes embed watermarks in the frequency domain based on subblock segmentation, while ignoring the ...
Deyang Wu +4 more
semanticscholar +1 more source
Video watermarking based on frequency domain is proved to have good invisibility and robustness. However, most of the existing video watermarking schemes embed watermarks in the frequency domain based on subblock segmentation, while ignoring the ...
Deyang Wu +4 more
semanticscholar +1 more source
Visual Cryptography Based Watermarking
2014The combination of watermarking schemes with visual cryptography has been recently used for the copyright protection of digital images. The derived schemes try to satisfy the increasing need for the security of multimedia data, caused in turn by the enormous amount of digital information that is daily created and distributed over different kinds of ...
S. Cimato, J. C. N. Yang, C. Wu
openaire +1 more source
Improved Schemes for Visual Cryptography
Designs, Codes and Cryptography, 2001A visual cryptography scheme (VCS) for a set of \(n\) participants is a technique to encode a secret image into \(n\) shadow images (also called shares or transparencies) where each participant receives one share with the property that certain sets of \(k\) or more of the shares allow the complete visual recovery of the image by stacking the ...
BLUNDO, Carlo +2 more
openaire +3 more sources
Design and Implementation of a Secure QR Payment System Based on Visual Cryptography
International Conference on Information Management, 2021In this paper, we will describe the design and implementation of a secure payment system based on QR codes. These QR codes have been extensively used in recent years since they speed up the payment process and provide users with ultimate convenience ...
Lina Ahmad, Rania Al-Sabha, A. Al-Haj
semanticscholar +1 more source
A Novel Image Encryption Using Parity Based Visual Cryptography
Ingénierie des Systèmes d Inf., 2021The current era is mainly focused on secured data transmission and every organization takes preventive measures to protect network’s private data. Among different techniques visual cryptography is a prominent one that that encrypts the visual information
K. S. Rao, S. Mandapati
semanticscholar +1 more source
Braille for Visual Cryptography
2014 IEEE International Symposium on Multimedia, 2014Visual Cryptography (VC) has been studied as a significant way of information security. In VC, original secret is divided into two images called shares. VC shares show no clue for secret perceptually, whereas participants are able to obtain the secret by simply superimposing the shares. Despite the obvious advantages of VC in crucial secret protection,
Guangyu Wang, Feng Liu, Wei Qi Yan
openaire +1 more source
Structure Aware Visual Cryptography
Computer Graphics Forum, 2014AbstractVisual cryptography is an encryption technique that hides a secret image by distributing it between some shared images made up of seemingly random black‐and‐white pixels. Extended visual cryptography (EVC) goes further in that the shared images instead represent meaningful binary pictures. The original approach to EVC suffered from low contrast,
Bin Liu +3 more
openaire +1 more source
On the Analysis and Design of Visual Cryptography With Error Correcting Capability
IEEE transactions on circuits and systems for video technology (Print), 2021A ( $k$ , $n$ ) visual cryptographic scheme (VCS) shares a secret image into $n$ shadow images that are distributed over $n$ involved participants. When $k$ participants stack their shadow images, the secret is revealed. The secret image of VCS is
Ching-Nung Yang, Yi-Yun Yang
semanticscholar +1 more source
Collaborative Visual Cryptography Schemes
IEEE Transactions on Circuits and Systems for Video Technology, 2018A ( $k,n$ )-conventional visual cryptography (VC) scheme is designed to share one secret and each participant takes one share. When some common participants are involved in multiple VC schemes for multiple secrets, each needs to take multiple shares. This procedure needs more shares, which is inconvenient.
Xingxing Jia +3 more
openaire +2 more sources

