Results 11 to 20 of about 30,954 (223)
A QR code-based user-friendly visual cryptography scheme [PDF]
Benefiting from the development of the Internet and smart devices, it is now convenient to transmit images anywhere and anytime, which poses a new challenge for image security.
Lijing Ren, Denghui Zhang
doaj +2 more sources
Privacy Protection of Digital Images Using Watermarking and QR Code-based Visual Cryptography [PDF]
The increase in information sharing in terms of digital images imposes threats to privacy and personal identity. Digital images can be stolen while in transfer and any kind of alteration can be done very easily. Thus, privacy protection of digital images
Akanksha Arora +2 more
doaj +2 more sources
Boolean Operation Based Visual Cryptography [PDF]
A ( $k$ , $n$ )-Traditional Visual Cryptographic Scheme (VCS) based on basis matrices encoded a secret image into $n$ shadow images distributed among $n$ participants.
Zhili Zhou +3 more
doaj +2 more sources
Secret Image Enhanced Sharing Using Visual Cryptography [PDF]
In the conventional visual cryptographic scheme, an image is divided into several image shares, which are distributed among the members of a group, and the original image is retrieved by combining the shares of all the members.
Brindha K., Jeyanthi N.
doaj +2 more sources
Lightweight XOR-based visual cryptography using random shares for secure colour image sharing with minimal shares [PDF]
In the current digital environment, safeguarding visual data from unauthorized use remains a substantial challenge. Sensitive imagery, including biometric, medical and defence images, represents a frequent target of destructive cyberattacks.
Faizal Nujumudeen +2 more
doaj +2 more sources
Lossless sharing visual cryptography
According to the information loss during the secret image sharing process, the lossless sharing visual crypto-graphy was proposed. The optimizations of two parameters were simplified into one parameter.
Bin YU, Zheng-xin FU
doaj +3 more sources
Secure Online Voting System using Visual Cryptography
The development of a secure online voting system using visual cryptography is highly essential for present voting systems. Based on the current requirements and design aspects of an existing online voting system, emerging technologies are required in ...
Meher Gayatri Devi TIWARI +1 more
doaj +3 more sources
Cloud Data Storage Confidentiality Using Steganography and Visual Cryptography: A Review [PDF]
Cloud computing security has emerged as one of the most significant trends in the information technology (IT) sector, and it is currently widely used in that sector, particularly with the growth of information in the cloud. The security of data stored in
Asmaa Hameed, Ogr. Uye. Oquz Karan
doaj +1 more source
A Privacy-Preserving Biometric Recognition System with Visual Cryptography
The popularity of more powerful and smarter digital devices has improved the quality of life and poses new challenges to the privacy protection of personal information.
Lijing Ren, Denghui Zhang
doaj +1 more source
Subliminal Channels in Visual Cryptography
This paper describes three methods of creating a subliminal channel in visual cryptography that are defined for a (2,2) sharing scheme. They work by hiding additional covert information besides the original encrypted image.
Katarzyna Koptyra, Marek R. Ogiela
doaj +1 more source

