Results 151 to 160 of about 2,287,880 (206)
Some of the next articles are maybe not open access.
Indirect visual cryptography scheme
SPIE Proceedings, 2015Visual cryptography (VC), a new cryptographic scheme for image. Here in encryption, image with message is encoded to be N sub-images and any K sub-images can decode the message in a special rules (N>=2 ...
Xiubo Yang, Tuo Li, Yishi Shi
openaire +1 more source
Visual cryptography via halftoning
SPIE Proceedings, 2003Visual cryptography encodes a secret binary image SI into n shares of random binary patterns. The secret image can be visually decoded by superimposing a qualified subset of shares, but no secret information can be obtained from the superposition of a forbidden subset. Such a scheme is mathematically secure, however, the binary patterns of the n shares
Gonzalo R. Arce +2 more
openaire +1 more source
Tracking-Tolerant Visual Cryptography
2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), 2019We introduce a novel secure display system, which uses visual cryptography [4] with tolerance for tracking. Our system brings cryptographic privacy from text to virtual worlds [3]. Much like traditional encryption that uses a public key and a private key, our system uses two images that are both necessary for visual decryption of the data.
Ruofei Du, Eric Lee, Amitabh Varshney
openaire +1 more source
Single-pixel Visual Cryptography
Frontiers in Optics / Laser Science, 2020Two novel visual cryptography (VC) schemes are proposed by combining VC with single-pixel imaging (SPI) for the first time. VC can be optically implemented in both object images and illumination patterns.
Shuming Jiao +4 more
openaire +1 more source
Applications of visual cryptography
International Journal of Parallel, Emergent and Distributed Systems, 2011Visual cryptography is a secret sharing scheme with only few known applications. This paper first modifies visual cryptography techniques to make them suitable for applications and then proposes some applications that use the modified techniques. These applications are secured communication system that are used to broadcast one or more secrets, multi ...
Subba Rao V. Yengisetty, Bimal K. Roy
openaire +1 more source
Various Visual Cryptography Schemes
2014Stemmed from traditional visual cryptography, more visual cryptography schemes have been developed and will be introduced in this chapter. The schemes include the extended visual cryptography, probabilistic visual cryptography, size-invariant visual cryptography, XOR-based visual cryptography, and a secret-enhanced visual cryptography.
Feng Liu, Wei Qi Yan
openaire +1 more source
On visual cryptography schemes
1998 Information Theory Workshop (Cat. No.98EX131), 2002We consider visual cryptography schemes in which two pixels combine in an arbitrary way. We analyze the pixel expansion and the contrast of (2,n)-threshold visual cryptography schemes, that is schemes in which any pair of n shares can visually reconstruct the secret image, but any single share has no information on the secret image.
openaire +1 more source
Security enhanced random grid visual cryptography scheme using master share and embedding method
International journal of information technology, 2023Neetha Francis, Thomas Monoth
semanticscholar +1 more source
Visual cryptography based on ghost imaging and Hadamard transform
Quantum Information Processing, 2023Yi Kang +6 more
semanticscholar +1 more source
Region Incrementing Visual Cryptography
IEEE Signal Processing Letters, 2009This letter presents a novel visual cryptography scheme, called region incrementing visual cryptography (RIVC), for sharing visual secrets with multiple secrecy levels in a single image. In the proposed n-level RIVC scheme, the content of an image S is designated to multiple regions associated with n secret levels, and encoded to n+1 shares with the ...
openaire +1 more source

