Results 21 to 30 of about 2,287,880 (206)
Personalized Shares in Visual Cryptography
This article deals with visual cryptography. It consists of hiding a message in two key images (also called shares). The decryption of the message is obtained through human vision by superposition of the shares.
Karim Hammoudi, Mahmoud Melkemi
doaj +1 more source
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as ...
Yasir Ahmed Hamza +2 more
doaj +1 more source
Improved Random Grid-based Cheating Prevention Visual Cryptography Using Latin Square
Visual cryptography scheme is a method of encrypting secret image into n noiselike shares. The secret image can be reconstructed by stacking adequate shares.
Sophie C. C. Sun +3 more
semanticscholar +1 more source
Boolean Operation Based Visual Cryptography
A ( $k$ , $n$ )-Traditional Visual Cryptographic Scheme (VCS) based on basis matrices encoded a secret image into $n$ shadow images distributed among $n$ participants.
Zhili Zhou +3 more
doaj +1 more source
Researchers have put forward many variations of schemes for secret image sharing on grounds of visual cryptography and polynomials. The authors of this paper put forward a novel scheme for sharing multiple secret images with perfect reconstruction and ...
Krishnaraj Bhat +3 more
doaj +1 more source
Alternative product authentication system using visual cryptography
Fraud and counterfeiting have caused various inconveniences to manufacturers and the product consumer market. To avoid counterfeiting and, therefore, bring a higher level of trust and security in commercial transactions, several authentication techniques
Rodrigo dos Santos Cicareli +1 more
doaj +1 more source
XOR-based Visual Cryptography Schemes [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hollmann, H.D.L. +3 more
openaire +1 more source
Threshold Visual Cryptography Schemes With Tagged Shares
The appearance of shares encoded by traditional visual cryptography is not easy to distinguish and meaningless. It means the shares cannot be managed efficiently nor user-friendly. A tagged visual cryptography scheme (TVCS) provides additional tag images
Pei-Ling Chiu, Kai-Hui Lee
doaj +1 more source
A Lightweight Privacy-Preserving System for the Security of Remote Sensing Images on IoT
The acquisition of massive remote sensing data makes it possible to deeply fuse remote sensing and artificial intelligence (AI). The mobility and cost advantages of new sensing platforms in the Internet of Things (IoT) make them ideal for continuous ...
Denghui Zhang +3 more
doaj +1 more source
Visual cryptography scheme on graphs with $m^{*}(G)=4$ [PDF]
Let $G=(V,E)$ be a connected graph and $\Gamma (G)$ be the strong access structure where obtained from graph $G$. A visual cryptography scheme (VCS) for a set $P$ of participants is a method to encode a secret image such that any pixel of this image ...
Mahmood Davarzani
doaj +1 more source

