Results 21 to 30 of about 30,954 (223)

An optimization of color halftone visual cryptography scheme based on Bat algorithm

open access: yesJournal of Intelligent Systems, 2021
Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of
Aswad Firas Mohammed   +2 more
doaj   +1 more source

Visual cryptography on graphs [PDF]

open access: yesJournal of Combinatorial Optimization, 2008
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lu, Steve   +2 more
openaire   +3 more sources

Visual Cryptography Scheme with Essential Participants

open access: yesMathematics, 2020
Visual cryptography scheme (VCS) shares a binary secret image into multiple shadows printed on transparencies. Stacking shadows can visually decode the secret image without computational resources. Specifically, a (k, n) threshold VCS ((k, n)-VCS) shares
Peng Li, Liping Yin, Jianfeng Ma
doaj   +1 more source

Verifiable Visual Cryptography [PDF]

open access: yes2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
The paper presents a verifiable visual cryptography (VC) scheme for checking the validness to the shares engaged in a VC decoding instance. the idea is to stamp a continuous pattern on the shares belonging to the same secret image, and a part of the pattern can be revealed through aligning and stacking half of two shares together.
Shuo-Fang Hsu   +4 more
openaire   +1 more source

Hyperchaotic technology-based efficient image encryption algorithm an overview. [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2023
Multimedia data encryption is so crucial because the multimedia encryption algorithm needs more time and memory, and it is difficult to implement. Because of this, the hyperchaotic image encryption technique is becoming more and more popular, which uses ...
Kawthar Khalaf, Ali Sagheer
doaj   +1 more source

Cheating Prevention in Visual Cryptography [PDF]

open access: yesIEEE Transactions on Image Processing, 2007
Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. Most of the previous research work on VC focuses on improving two parameters: pixel expansion and contrast.
Chih-Ming, Hu, Wen-Guey, Tzeng
openaire   +2 more sources

Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography [PDF]

open access: yes, 2017
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is ...
Emuoyibofarhe, Justice   +2 more
core   +2 more sources

Personalized Shares in Visual Cryptography

open access: yesJournal of Imaging, 2018
This article deals with visual cryptography. It consists of hiding a message in two key images (also called shares). The decryption of the message is obtained through human vision by superposition of the shares.
Karim Hammoudi, Mahmoud Melkemi
doaj   +1 more source

On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]

open access: yes, 2006
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat   +4 more
core   +6 more sources

An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing

open access: yesمجلة بغداد للعلوم, 2022
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as ...
Yasir Ahmed Hamza   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy