Results 21 to 30 of about 30,954 (223)
An optimization of color halftone visual cryptography scheme based on Bat algorithm
Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of
Aswad Firas Mohammed +2 more
doaj +1 more source
Visual cryptography on graphs [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lu, Steve +2 more
openaire +3 more sources
Visual Cryptography Scheme with Essential Participants
Visual cryptography scheme (VCS) shares a binary secret image into multiple shadows printed on transparencies. Stacking shadows can visually decode the secret image without computational resources. Specifically, a (k, n) threshold VCS ((k, n)-VCS) shares
Peng Li, Liping Yin, Jianfeng Ma
doaj +1 more source
Verifiable Visual Cryptography [PDF]
The paper presents a verifiable visual cryptography (VC) scheme for checking the validness to the shares engaged in a VC decoding instance. the idea is to stamp a continuous pattern on the shares belonging to the same secret image, and a part of the pattern can be revealed through aligning and stacking half of two shares together.
Shuo-Fang Hsu +4 more
openaire +1 more source
Hyperchaotic technology-based efficient image encryption algorithm an overview. [PDF]
Multimedia data encryption is so crucial because the multimedia encryption algorithm needs more time and memory, and it is difficult to implement. Because of this, the hyperchaotic image encryption technique is becoming more and more popular, which uses ...
Kawthar Khalaf, Ali Sagheer
doaj +1 more source
Cheating Prevention in Visual Cryptography [PDF]
Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. Most of the previous research work on VC focuses on improving two parameters: pixel expansion and contrast.
Chih-Ming, Hu, Wen-Guey, Tzeng
openaire +2 more sources
Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography [PDF]
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is ...
Emuoyibofarhe, Justice +2 more
core +2 more sources
Personalized Shares in Visual Cryptography
This article deals with visual cryptography. It consists of hiding a message in two key images (also called shares). The decryption of the message is obtained through human vision by superposition of the shares.
Karim Hammoudi, Mahmoud Melkemi
doaj +1 more source
On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat +4 more
core +6 more sources
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as ...
Yasir Ahmed Hamza +2 more
doaj +1 more source

