Results 41 to 50 of about 2,287,880 (206)
Bounds for visual cryptography schemes
In this paper, we investigate the best pixel expansion of the various models of visual cryptography schemes. In this regard, we consider visual cryptography schemes introduced by Tzeng and Hu [13]. In such a model, only minimal qualified sets can recover the secret image and that the recovered secret image can be darker or lighter than the background ...
Hajiabolhassan, Hossein, Cheraghi, Abbas
openaire +2 more sources
Visual cryptography in single-pixel imaging [PDF]
Two novel visual cryptography (VC) schemes are proposed by combining VC with single-pixel imaging (SPI) for the first time. It is pointed out that the overlapping of visual key images in VC is similar to the superposition of pixel intensities by a single-
Shuming Jiao +4 more
semanticscholar +1 more source
Extended capabilities for visual cryptography
An extended visual cryptography scheme, for an access structure \((\Gamma_{Qual},\Gamma_{Forb})\) on a set of \(n\) participants, is a technique to encode \(n\) images in such a way that when we stack together the transparencies associated to participants in any set \(X \in \Gamma_{\text{Qual}}\) we get the secret message with no trace of the original ...
BLUNDO, Carlo +3 more
openaire +3 more sources
Biometric Security Through Visual Encryption for Fog Edge Computing
Fog and mobile edge computing have gained considerable attention from the research and development community. The problems related to security and privacy of biometric content are simpler to solve through edge computing resulting in improved security and
Wadood Abdul +5 more
doaj +1 more source
Secure E-Voting System Using Visual Cryptography & Block Chain Ledger
Expanding advanced innovation has revolutionized the life of individuals. In this digital world many countries are trying to initiate an E-voting system in regular election process.
Ashwini S Solankar
semanticscholar +1 more source
Effect of Dual Reinforcement on Wear Resistance by Aluminum Compacts Reinforce by SiC, Al2O3 [PDF]
The producing composite materials of dual reinforcement in which the matrix material is aluminum reinforced with two types of ceramic particles : which are Alumina (50μmKeywordscomposite materials; wear test ; Al2O3; SiC ...
Mohammed Waheed, Hassan Abed
doaj +1 more source
All-optical vector visual cryptography with high security and rapid decryption
Meta optics-empowered vector visual cryptography at the abundant degrees of freedom of light and spatial dislocation can open an avenue for optical information security and anti-counterfeiting with a compact footprint and rapid decryption.
Zhekun Chen, Minghui Hong
doaj +1 more source
The growing reliance on digital technologies demands an urgent advancement of a secure framework for remote voting systems. This paper proposes a novel e-voting framework which is reinforced by a combination of visual cryptography, elliptic curve ...
Gaurav Thakur +3 more
doaj +1 more source
Hybrid Techniques for Proposed Intelligent Digital Image Watermarking [PDF]
Digital watermarking provides a solution of the recent problems such as a copyright protection and digital content authentication, as well as the balancing between the copyright protection and authentication requirements are the challenge of the many ...
Bashar S Mahdi, Alia K. Abdul Hassan
doaj +1 more source
Colored visual cryptography without color darkening
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
S. CIMATO +2 more
openaire +4 more sources

