Results 21 to 30 of about 2,287,880 (206)

Personalized Shares in Visual Cryptography

open access: yesJournal of Imaging, 2018
This article deals with visual cryptography. It consists of hiding a message in two key images (also called shares). The decryption of the message is obtained through human vision by superposition of the shares.
Karim Hammoudi, Mahmoud Melkemi
doaj   +1 more source

An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing

open access: yesمجلة بغداد للعلوم, 2022
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as ...
Yasir Ahmed Hamza   +2 more
doaj   +1 more source

Improved Random Grid-based Cheating Prevention Visual Cryptography Using Latin Square

open access: yesACM Trans. Multim. Comput. Commun. Appl., 2022
Visual cryptography scheme is a method of encrypting secret image into n noiselike shares. The secret image can be reconstructed by stacking adequate shares.
Sophie C. C. Sun   +3 more
semanticscholar   +1 more source

Boolean Operation Based Visual Cryptography

open access: yesIEEE Access, 2019
A ( $k$ , $n$ )-Traditional Visual Cryptographic Scheme (VCS) based on basis matrices encoded a secret image into $n$ shadow images distributed among $n$ participants.
Zhili Zhou   +3 more
doaj   +1 more source

A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography

open access: yesIET Information Security, 2021
Researchers have put forward many variations of schemes for secret image sharing on grounds of visual cryptography and polynomials. The authors of this paper put forward a novel scheme for sharing multiple secret images with perfect reconstruction and ...
Krishnaraj Bhat   +3 more
doaj   +1 more source

Alternative product authentication system using visual cryptography

open access: yesSemina: Ciências Exatas e Tecnológicas, 2020
Fraud and counterfeiting have caused various inconveniences to manufacturers and the product consumer market. To avoid counterfeiting and, therefore, bring a higher level of trust and security in commercial transactions, several authentication techniques
Rodrigo dos Santos Cicareli   +1 more
doaj   +1 more source

XOR-based Visual Cryptography Schemes [PDF]

open access: yesDesigns, Codes and Cryptography, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hollmann, H.D.L.   +3 more
openaire   +1 more source

Threshold Visual Cryptography Schemes With Tagged Shares

open access: yesIEEE Access, 2020
The appearance of shares encoded by traditional visual cryptography is not easy to distinguish and meaningless. It means the shares cannot be managed efficiently nor user-friendly. A tagged visual cryptography scheme (TVCS) provides additional tag images
Pei-Ling Chiu, Kai-Hui Lee
doaj   +1 more source

A Lightweight Privacy-Preserving System for the Security of Remote Sensing Images on IoT

open access: yesRemote Sensing, 2022
The acquisition of massive remote sensing data makes it possible to deeply fuse remote sensing and artificial intelligence (AI). The mobility and cost advantages of new sensing platforms in the Internet of Things (IoT) make them ideal for continuous ...
Denghui Zhang   +3 more
doaj   +1 more source

Visual cryptography scheme on graphs with $m^{*}(G)=4$ [PDF]

open access: yesTransactions on Combinatorics, 2019
‎Let $G=(V,E)$ be a connected graph and $\Gamma (G)$ be the strong access structure where obtained from graph $G$‎. ‎A visual cryptography scheme (VCS) for a set $P$ of participants is a method to encode a secret image such that any pixel of this image ...
Mahmood Davarzani
doaj   +1 more source

Home - About - Disclaimer - Privacy