Results 11 to 20 of about 2,287,880 (206)
Lightweight XOR-based visual cryptography using random shares for secure colour image sharing with minimal shares [PDF]
In the current digital environment, safeguarding visual data from unauthorized use remains a substantial challenge. Sensitive imagery, including biometric, medical and defence images, represents a frequent target of destructive cyberattacks.
Faizal Nujumudeen +2 more
doaj +2 more sources
Visual cryptography on graphs [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lu, Steve +2 more
openaire +3 more sources
The usage of images in different fields has increased dramatically, especially in medical image analysis and social media. Many risks can threaten the integrity and confidentiality of digital images transmitted through the internet.
Moataz Z. Salim +2 more
semanticscholar +1 more source
XOR-Based (n, n) Visual Cryptography Schemes for Grayscale or Color Images with Meaningful Shares
XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle of XOR-based VCS is to encrypt a secret image into several encrypted images, called shares.
Yu-Hong Chen, J. Juan
semanticscholar +1 more source
CMY Color Spaced-Based Visual Cryptography Scheme for Secret Sharing of Data
Visual cryptography technique allows visual information to be encrypted in such a way that the decrypted information appears as a visual image. Visual cryptography allows digital images to be separate into few shares called transparent shares.
Anli Sherine +4 more
semanticscholar +1 more source
Visual Cryptography Scheme with Essential Participants
Visual cryptography scheme (VCS) shares a binary secret image into multiple shadows printed on transparencies. Stacking shadows can visually decode the secret image without computational resources. Specifically, a (k, n) threshold VCS ((k, n)-VCS) shares
Peng Li, Liping Yin, Jianfeng Ma
doaj +1 more source
Hyperchaotic technology-based efficient image encryption algorithm an overview. [PDF]
Multimedia data encryption is so crucial because the multimedia encryption algorithm needs more time and memory, and it is difficult to implement. Because of this, the hyperchaotic image encryption technique is becoming more and more popular, which uses ...
Kawthar Khalaf, Ali Sagheer
doaj +1 more source
Verifiable Visual Cryptography [PDF]
The paper presents a verifiable visual cryptography (VC) scheme for checking the validness to the shares engaged in a VC decoding instance. the idea is to stamp a continuous pattern on the shares belonging to the same secret image, and a part of the pattern can be revealed through aligning and stacking half of two shares together.
Shuo-Fang Hsu +4 more
openaire +1 more source
Designing a Visual Cryptography Curriculum for K-12 Education [PDF]
We have designed and developed a simple, visual, and narrative K-12 cybersecurity curriculum leveraging the Scratch programming platform to demonstrate and teach fundamental cybersecurity concepts such as confidentiality, integrity protection, and ...
Pranathi Rayavaram +3 more
semanticscholar +1 more source
Cheating Prevention in Visual Cryptography [PDF]
Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. Most of the previous research work on VC focuses on improving two parameters: pixel expansion and contrast.
Chih-Ming, Hu, Wen-Guey, Tzeng
openaire +2 more sources

