Results 11 to 20 of about 30,954 (223)

A QR code-based user-friendly visual cryptography scheme [PDF]

open access: yesScientific Reports, 2022
Benefiting from the development of the Internet and smart devices, it is now convenient to transmit images anywhere and anytime, which poses a new challenge for image security.
Lijing Ren, Denghui Zhang
doaj   +2 more sources

Privacy Protection of Digital Images Using Watermarking and QR Code-based Visual Cryptography [PDF]

open access: goldAdvances in Multimedia, 2023
The increase in information sharing in terms of digital images imposes threats to privacy and personal identity. Digital images can be stolen while in transfer and any kind of alteration can be done very easily. Thus, privacy protection of digital images
Akanksha Arora   +2 more
doaj   +2 more sources

Boolean Operation Based Visual Cryptography [PDF]

open access: goldIEEE Access, 2019
A ( $k$ , $n$ )-Traditional Visual Cryptographic Scheme (VCS) based on basis matrices encoded a secret image into $n$ shadow images distributed among $n$ participants.
Zhili Zhou   +3 more
doaj   +2 more sources

Secret Image Enhanced Sharing Using Visual Cryptography [PDF]

open access: diamondCybernetics and Information Technologies, 2017
In the conventional visual cryptographic scheme, an image is divided into several image shares, which are distributed among the members of a group, and the original image is retrieved by combining the shares of all the members.
Brindha K., Jeyanthi N.
doaj   +2 more sources

Lightweight XOR-based visual cryptography using random shares for secure colour image sharing with minimal shares [PDF]

open access: yesScientific Reports
In the current digital environment, safeguarding visual data from unauthorized use remains a substantial challenge. Sensitive imagery, including biometric, medical and defence images, represents a frequent target of destructive cyberattacks.
Faizal Nujumudeen   +2 more
doaj   +2 more sources

Lossless sharing visual cryptography

open access: yesTongxin xuebao, 2013
According to the information loss during the secret image sharing process, the lossless sharing visual crypto-graphy was proposed. The optimizations of two parameters were simplified into one parameter.
Bin YU, Zheng-xin FU
doaj   +3 more sources

Secure Online Voting System using Visual Cryptography

open access: yesWalailak Journal of Science and Technology, 2021
The development of a secure online voting system using visual cryptography is highly essential for present voting systems. Based on the current requirements and design aspects of an existing online voting system, emerging technologies are required in ...
Meher Gayatri Devi TIWARI   +1 more
doaj   +3 more sources

Cloud Data Storage Confidentiality Using Steganography and Visual Cryptography: A Review [PDF]

open access: yesمجلة التربية والعلم, 2023
Cloud computing security has emerged as one of the most significant trends in the information technology (IT) sector, and it is currently widely used in that sector, particularly with the growth of information in the cloud. The security of data stored in
Asmaa Hameed, Ogr. Uye. Oquz Karan
doaj   +1 more source

A Privacy-Preserving Biometric Recognition System with Visual Cryptography

open access: yesAdvances in Multimedia, 2022
The popularity of more powerful and smarter digital devices has improved the quality of life and poses new challenges to the privacy protection of personal information.
Lijing Ren, Denghui Zhang
doaj   +1 more source

Subliminal Channels in Visual Cryptography

open access: yesCryptography, 2022
This paper describes three methods of creating a subliminal channel in visual cryptography that are defined for a (2,2) sharing scheme. They work by hiding additional covert information besides the original encrypted image.
Katarzyna Koptyra, Marek R. Ogiela
doaj   +1 more source

Home - About - Disclaimer - Privacy