Results 31 to 40 of about 30,954 (223)
Researchers have put forward many variations of schemes for secret image sharing on grounds of visual cryptography and polynomials. The authors of this paper put forward a novel scheme for sharing multiple secret images with perfect reconstruction and ...
Krishnaraj Bhat +3 more
doaj +1 more source
XOR-based Visual Cryptography Schemes [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hollmann, H.D.L. +3 more
openaire +1 more source
E-Voting in an ubicomp world: trust, privacy, and social implications [PDF]
The advances made in technology have unchained the user from the desktop into interactions where access is anywhere, anytime. In addition, the introduction of ubiquitous computing (ubicomp) will see further changes in how we interact with technology and ...
Bederson, B.B. +29 more
core +3 more sources
Alternative product authentication system using visual cryptography
Fraud and counterfeiting have caused various inconveniences to manufacturers and the product consumer market. To avoid counterfeiting and, therefore, bring a higher level of trust and security in commercial transactions, several authentication techniques
Rodrigo dos Santos Cicareli +1 more
doaj +1 more source
Threshold Visual Cryptography Schemes With Tagged Shares
The appearance of shares encoded by traditional visual cryptography is not easy to distinguish and meaningless. It means the shares cannot be managed efficiently nor user-friendly. A tagged visual cryptography scheme (TVCS) provides additional tag images
Pei-Ling Chiu, Kai-Hui Lee
doaj +1 more source
A Lightweight Privacy-Preserving System for the Security of Remote Sensing Images on IoT
The acquisition of massive remote sensing data makes it possible to deeply fuse remote sensing and artificial intelligence (AI). The mobility and cost advantages of new sensing platforms in the Internet of Things (IoT) make them ideal for continuous ...
Denghui Zhang +3 more
doaj +1 more source
Perfect contrast visual cryptography scheme
A perfect contrast visual cryptography scheme with the best contrast based on both the perfect black visual cryptography scheme(PBVCS) and the non-perfect black visual cryptography scheme(NPBVCS) was proposed.The proposed scheme applied simple Boolean ...
HAN Yan-yan1, HE Wen-cai1, HU Yu-pu1
doaj +2 more sources
Visual cryptography scheme on graphs with $m^{*}(G)=4$ [PDF]
Let $G=(V,E)$ be a connected graph and $\Gamma (G)$ be the strong access structure where obtained from graph $G$. A visual cryptography scheme (VCS) for a set $P$ of participants is a method to encode a secret image such that any pixel of this image ...
Mahmood Davarzani
doaj +1 more source
Safeguarding images over insecure channel using master key visual cryptopgraphy
Sharing secrets and safeguarding them while being sent over insecure channel is a crucial matter. Visual Cryptography still has the strong potential to secure this critical issue.
May A. Salama +2 more
doaj +1 more source
Applying Visual Cryptography to Enhance Text Captchas
Nowadays, lots of applications and websites utilize text-based captchas to partially protect the authentication mechanism. However, in recent years, different ways have been exploited to automatically recognize text-based captchas especially deep ...
Xuehu Yan +3 more
doaj +1 more source

