Results 31 to 40 of about 30,954 (223)

A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography

open access: yesIET Information Security, 2021
Researchers have put forward many variations of schemes for secret image sharing on grounds of visual cryptography and polynomials. The authors of this paper put forward a novel scheme for sharing multiple secret images with perfect reconstruction and ...
Krishnaraj Bhat   +3 more
doaj   +1 more source

XOR-based Visual Cryptography Schemes [PDF]

open access: yesDesigns, Codes and Cryptography, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hollmann, H.D.L.   +3 more
openaire   +1 more source

E-Voting in an ubicomp world: trust, privacy, and social implications [PDF]

open access: yes, 2008
The advances made in technology have unchained the user from the desktop into interactions where access is anywhere, anytime. In addition, the introduction of ubiquitous computing (ubicomp) will see further changes in how we interact with technology and ...
Bederson, B.B.   +29 more
core   +3 more sources

Alternative product authentication system using visual cryptography

open access: yesSemina: Ciências Exatas e Tecnológicas, 2020
Fraud and counterfeiting have caused various inconveniences to manufacturers and the product consumer market. To avoid counterfeiting and, therefore, bring a higher level of trust and security in commercial transactions, several authentication techniques
Rodrigo dos Santos Cicareli   +1 more
doaj   +1 more source

Threshold Visual Cryptography Schemes With Tagged Shares

open access: yesIEEE Access, 2020
The appearance of shares encoded by traditional visual cryptography is not easy to distinguish and meaningless. It means the shares cannot be managed efficiently nor user-friendly. A tagged visual cryptography scheme (TVCS) provides additional tag images
Pei-Ling Chiu, Kai-Hui Lee
doaj   +1 more source

A Lightweight Privacy-Preserving System for the Security of Remote Sensing Images on IoT

open access: yesRemote Sensing, 2022
The acquisition of massive remote sensing data makes it possible to deeply fuse remote sensing and artificial intelligence (AI). The mobility and cost advantages of new sensing platforms in the Internet of Things (IoT) make them ideal for continuous ...
Denghui Zhang   +3 more
doaj   +1 more source

Perfect contrast visual cryptography scheme

open access: yesTongxin xuebao, 2009
A perfect contrast visual cryptography scheme with the best contrast based on both the perfect black visual cryptography scheme(PBVCS) and the non-perfect black visual cryptography scheme(NPBVCS) was proposed.The proposed scheme applied simple Boolean ...
HAN Yan-yan1, HE Wen-cai1, HU Yu-pu1
doaj   +2 more sources

Visual cryptography scheme on graphs with $m^{*}(G)=4$ [PDF]

open access: yesTransactions on Combinatorics, 2019
‎Let $G=(V,E)$ be a connected graph and $\Gamma (G)$ be the strong access structure where obtained from graph $G$‎. ‎A visual cryptography scheme (VCS) for a set $P$ of participants is a method to encode a secret image such that any pixel of this image ...
Mahmood Davarzani
doaj   +1 more source

Safeguarding images over insecure channel using master key visual cryptopgraphy

open access: yesAin Shams Engineering Journal, 2018
Sharing secrets and safeguarding them while being sent over insecure channel is a crucial matter. Visual Cryptography still has the strong potential to secure this critical issue.
May A. Salama   +2 more
doaj   +1 more source

Applying Visual Cryptography to Enhance Text Captchas

open access: yesMathematics, 2020
Nowadays, lots of applications and websites utilize text-based captchas to partially protect the authentication mechanism. However, in recent years, different ways have been exploited to automatically recognize text-based captchas especially deep ...
Xuehu Yan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy