Results 11 to 20 of about 2,287,880 (206)

Lightweight XOR-based visual cryptography using random shares for secure colour image sharing with minimal shares [PDF]

open access: yesScientific Reports
In the current digital environment, safeguarding visual data from unauthorized use remains a substantial challenge. Sensitive imagery, including biometric, medical and defence images, represents a frequent target of destructive cyberattacks.
Faizal Nujumudeen   +2 more
doaj   +2 more sources

Visual cryptography on graphs [PDF]

open access: yesJournal of Combinatorial Optimization, 2008
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lu, Steve   +2 more
openaire   +3 more sources

A Visual Cryptography-Based Watermarking Approach for the Detection and Localization of Image Forgery

open access: yesElectronics, 2022
The usage of images in different fields has increased dramatically, especially in medical image analysis and social media. Many risks can threaten the integrity and confidentiality of digital images transmitted through the internet.
Moataz Z. Salim   +2 more
semanticscholar   +1 more source

XOR-Based (n, n) Visual Cryptography Schemes for Grayscale or Color Images with Meaningful Shares

open access: yesApplied Sciences, 2022
XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle of XOR-based VCS is to encrypt a secret image into several encrypted images, called shares.
Yu-Hong Chen, J. Juan
semanticscholar   +1 more source

CMY Color Spaced-Based Visual Cryptography Scheme for Secret Sharing of Data

open access: yesWireless Communications and Mobile Computing, 2022
Visual cryptography technique allows visual information to be encrypted in such a way that the decrypted information appears as a visual image. Visual cryptography allows digital images to be separate into few shares called transparent shares.
Anli Sherine   +4 more
semanticscholar   +1 more source

Visual Cryptography Scheme with Essential Participants

open access: yesMathematics, 2020
Visual cryptography scheme (VCS) shares a binary secret image into multiple shadows printed on transparencies. Stacking shadows can visually decode the secret image without computational resources. Specifically, a (k, n) threshold VCS ((k, n)-VCS) shares
Peng Li, Liping Yin, Jianfeng Ma
doaj   +1 more source

Hyperchaotic technology-based efficient image encryption algorithm an overview. [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2023
Multimedia data encryption is so crucial because the multimedia encryption algorithm needs more time and memory, and it is difficult to implement. Because of this, the hyperchaotic image encryption technique is becoming more and more popular, which uses ...
Kawthar Khalaf, Ali Sagheer
doaj   +1 more source

Verifiable Visual Cryptography [PDF]

open access: yes2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
The paper presents a verifiable visual cryptography (VC) scheme for checking the validness to the shares engaged in a VC decoding instance. the idea is to stamp a continuous pattern on the shares belonging to the same secret image, and a part of the pattern can be revealed through aligning and stacking half of two shares together.
Shuo-Fang Hsu   +4 more
openaire   +1 more source

Designing a Visual Cryptography Curriculum for K-12 Education [PDF]

open access: yesIEEE Global Engineering Education Conference, 2022
We have designed and developed a simple, visual, and narrative K-12 cybersecurity curriculum leveraging the Scratch programming platform to demonstrate and teach fundamental cybersecurity concepts such as confidentiality, integrity protection, and ...
Pranathi Rayavaram   +3 more
semanticscholar   +1 more source

Cheating Prevention in Visual Cryptography [PDF]

open access: yesIEEE Transactions on Image Processing, 2007
Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. Most of the previous research work on VC focuses on improving two parameters: pixel expansion and contrast.
Chih-Ming, Hu, Wen-Guey, Tzeng
openaire   +2 more sources

Home - About - Disclaimer - Privacy