Results 141 to 150 of about 2,287,880 (206)
Some of the next articles are maybe not open access.

Copyright protection scheme for color images using extended visual cryptography

Computers & electrical engineering, 2021
Most of the existing visual cryptography based copyright protection schemes create random looking shares which can create suspicion of some secret information being shared.
Sonal Kukreja   +2 more
semanticscholar   +1 more source

Novel Robust Video Watermarking Scheme Based on Concentric Ring Subband and Visual Cryptography With Piecewise Linear Chaotic Mapping

IEEE transactions on circuits and systems for video technology (Print)
Video watermarking based on frequency domain is proved to have good invisibility and robustness. However, most of the existing video watermarking schemes embed watermarks in the frequency domain based on subblock segmentation, while ignoring the ...
Deyang Wu   +4 more
semanticscholar   +1 more source

Visual Cryptography Based Watermarking

2014
The combination of watermarking schemes with visual cryptography has been recently used for the copyright protection of digital images. The derived schemes try to satisfy the increasing need for the security of multimedia data, caused in turn by the enormous amount of digital information that is daily created and distributed over different kinds of ...
S. Cimato, J. C. N. Yang, C. Wu
openaire   +1 more source

Improved Schemes for Visual Cryptography

Designs, Codes and Cryptography, 2001
A visual cryptography scheme (VCS) for a set of \(n\) participants is a technique to encode a secret image into \(n\) shadow images (also called shares or transparencies) where each participant receives one share with the property that certain sets of \(k\) or more of the shares allow the complete visual recovery of the image by stacking the ...
BLUNDO, Carlo   +2 more
openaire   +3 more sources

Design and Implementation of a Secure QR Payment System Based on Visual Cryptography

International Conference on Information Management, 2021
In this paper, we will describe the design and implementation of a secure payment system based on QR codes. These QR codes have been extensively used in recent years since they speed up the payment process and provide users with ultimate convenience ...
Lina Ahmad, Rania Al-Sabha, A. Al-Haj
semanticscholar   +1 more source

A Novel Image Encryption Using Parity Based Visual Cryptography

Ingénierie des Systèmes d Inf., 2021
The current era is mainly focused on secured data transmission and every organization takes preventive measures to protect network’s private data. Among different techniques visual cryptography is a prominent one that that encrypts the visual information
K. S. Rao, S. Mandapati
semanticscholar   +1 more source

Braille for Visual Cryptography

2014 IEEE International Symposium on Multimedia, 2014
Visual Cryptography (VC) has been studied as a significant way of information security. In VC, original secret is divided into two images called shares. VC shares show no clue for secret perceptually, whereas participants are able to obtain the secret by simply superimposing the shares. Despite the obvious advantages of VC in crucial secret protection,
Guangyu Wang, Feng Liu, Wei Qi Yan
openaire   +1 more source

Structure Aware Visual Cryptography

Computer Graphics Forum, 2014
AbstractVisual cryptography is an encryption technique that hides a secret image by distributing it between some shared images made up of seemingly random black‐and‐white pixels. Extended visual cryptography (EVC) goes further in that the shared images instead represent meaningful binary pictures. The original approach to EVC suffered from low contrast,
Bin Liu   +3 more
openaire   +1 more source

On the Analysis and Design of Visual Cryptography With Error Correcting Capability

IEEE transactions on circuits and systems for video technology (Print), 2021
A ( $k$ , $n$ ) visual cryptographic scheme (VCS) shares a secret image into $n$ shadow images that are distributed over $n$ involved participants. When $k$ participants stack their shadow images, the secret is revealed. The secret image of VCS is
Ching-Nung Yang, Yi-Yun Yang
semanticscholar   +1 more source

Collaborative Visual Cryptography Schemes

IEEE Transactions on Circuits and Systems for Video Technology, 2018
A ( $k,n$ )-conventional visual cryptography (VC) scheme is designed to share one secret and each participant takes one share. When some common participants are involved in multiple VC schemes for multiple secrets, each needs to take multiple shares. This procedure needs more shares, which is inconvenient.
Xingxing Jia   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy