Results 41 to 50 of about 2,287,880 (206)

Bounds for visual cryptography schemes

open access: yesDiscrete Applied Mathematics, 2010
In this paper, we investigate the best pixel expansion of the various models of visual cryptography schemes. In this regard, we consider visual cryptography schemes introduced by Tzeng and Hu [13]. In such a model, only minimal qualified sets can recover the secret image and that the recovered secret image can be darker or lighter than the background ...
Hajiabolhassan, Hossein, Cheraghi, Abbas
openaire   +2 more sources

Visual cryptography in single-pixel imaging [PDF]

open access: yesOptics Express, 2019
Two novel visual cryptography (VC) schemes are proposed by combining VC with single-pixel imaging (SPI) for the first time. It is pointed out that the overlapping of visual key images in VC is similar to the superposition of pixel intensities by a single-
Shuming Jiao   +4 more
semanticscholar   +1 more source

Extended capabilities for visual cryptography

open access: yesTheoretical Computer Science, 2001
An extended visual cryptography scheme, for an access structure \((\Gamma_{Qual},\Gamma_{Forb})\) on a set of \(n\) participants, is a technique to encode \(n\) images in such a way that when we stack together the transparencies associated to participants in any set \(X \in \Gamma_{\text{Qual}}\) we get the secret message with no trace of the original ...
BLUNDO, Carlo   +3 more
openaire   +3 more sources

Biometric Security Through Visual Encryption for Fog Edge Computing

open access: yesIEEE Access, 2017
Fog and mobile edge computing have gained considerable attention from the research and development community. The problems related to security and privacy of biometric content are simpler to solve through edge computing resulting in improved security and
Wadood Abdul   +5 more
doaj   +1 more source

Secure E-Voting System Using Visual Cryptography & Block Chain Ledger

open access: yesTurkish Journal of Computer and Mathematics Education, 2021
Expanding advanced innovation has revolutionized the life of individuals. In this digital world many countries are trying to initiate an E-voting system in regular election process.
Ashwini S Solankar
semanticscholar   +1 more source

Effect of Dual Reinforcement on Wear Resistance by Aluminum Compacts Reinforce by SiC, Al2O3 [PDF]

open access: yesEngineering and Technology Journal, 2009
The producing composite materials of dual reinforcement in which the matrix material is aluminum reinforced with two types of ceramic particles : which are Alumina (50μmKeywordscomposite materials; wear test ; Al2O3; SiC ...
Mohammed Waheed, Hassan Abed
doaj   +1 more source

All-optical vector visual cryptography with high security and rapid decryption

open access: yesOpto-Electronic Advances, 2023
Meta optics-empowered vector visual cryptography at the abundant degrees of freedom of light and spatial dislocation can open an avenue for optical information security and anti-counterfeiting with a compact footprint and rapid decryption.
Zhekun Chen, Minghui Hong
doaj   +1 more source

Fortifying E-Voting Systems: Integrating Visual Cryptography with ECC and ChaCha20-Poly1305 for Enhanced Security

open access: yesJournal of Communications Software and Systems
The growing reliance on digital technologies demands an urgent advancement of a secure framework for remote voting systems. This paper proposes a novel e-voting framework which is reinforced by a combination of visual cryptography, elliptic curve ...
Gaurav Thakur   +3 more
doaj   +1 more source

Hybrid Techniques for Proposed Intelligent Digital Image Watermarking [PDF]

open access: yesEngineering and Technology Journal, 2015
Digital watermarking provides a solution of the recent problems such as a copyright protection and digital content authentication, as well as the balancing between the copyright protection and authentication requirements are the challenge of the many ...
Bashar S Mahdi, Alia K. Abdul Hassan
doaj   +1 more source

Colored visual cryptography without color darkening

open access: yesTheoretical Computer Science, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
S. CIMATO   +2 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy