Results 31 to 40 of about 2,287,880 (206)
A Secret Image Sharing Based on Logistic-Chebyshev Chaotic Map and Chinese Remainder Theorem [PDF]
Visual secret sharing (VSS) was introduced in order to solve information security issues. It is a modern cryptographic technique. It involves breaking up a secret image into $n$ secured components known as shares.
Asmaa Hilmi +2 more
doaj +1 more source
Safeguarding images over insecure channel using master key visual cryptopgraphy
Sharing secrets and safeguarding them while being sent over insecure channel is a crucial matter. Visual Cryptography still has the strong potential to secure this critical issue.
May A. Salama +2 more
doaj +1 more source
Applying Visual Cryptography to Enhance Text Captchas
Nowadays, lots of applications and websites utilize text-based captchas to partially protect the authentication mechanism. However, in recent years, different ways have been exploited to automatically recognize text-based captchas especially deep ...
Xuehu Yan +3 more
doaj +1 more source
PiouCrypt: Decentralized lattice-based method for visual symmetric cryptography
In recent years, establishing secure visual communications has turned into one of the essential problems for security engineers and researchers. However, only limited novel solutions are provided for image encryption, and limiting visual cryptography to ...
Navid Abapour, Mohsen Ebadpour
doaj +1 more source
Perfect contrast visual cryptography scheme
A perfect contrast visual cryptography scheme with the best contrast based on both the perfect black visual cryptography scheme(PBVCS) and the non-perfect black visual cryptography scheme(NPBVCS) was proposed.The proposed scheme applied simple Boolean ...
HAN Yan-yan1, HE Wen-cai1, HU Yu-pu1
doaj +2 more sources
: With the increasing need of sensitive or secret data transmission through public network, security demands using cryptography and steganography are becoming a thirsty research area of last few years.
Pranati Rakshit +3 more
semanticscholar +1 more source
A cheating prevention EVC scheme using watermarking techniques
Visual Cryptography (VC), proposed by Naor and Shamir in 1994, is a variation of the conventional secret sharing scheme. In VC, instead of a numerical secret key, a secret image is shared among participants in the form of images called shares.
Angelina Espejel Trujillo +3 more
doaj +1 more source
Generate Animated CAPTCHA Based on Visual Cryptography Concept [PDF]
CAPTCHA is a standard security technology. To date, the most commonly used are various types of visual CAPTCHAs, in which a challenge often appears as an image of distorted text that the user must decipher. The proposed scheme is used visual cryptography
Akbas E. Ali +2 more
doaj +1 more source
A Novel Raster Map Exchange Scheme Based on Visual Cryptography
Raster map is an image that has been discretized in space and brightness, and it is an important carrier of geospatial data. With the rapid development of Internet and big data technologies, preserving the privacy of raster map has become an urgent task.
Lijing Ren
semanticscholar +1 more source
Magic sheets: Visual cryptography with common shares
Visual cryptography (VC) is an encryption technique for hiding a secret image in distributed and shared images (referred to as shares). VC schemes are employed to encrypt multiple images as meaningless, noisy patterns or meaningful images.
Naoki Kita, Kazunori Miyata
doaj +1 more source

