Results 41 to 50 of about 30,954 (223)
PiouCrypt: Decentralized lattice-based method for visual symmetric cryptography
In recent years, establishing secure visual communications has turned into one of the essential problems for security engineers and researchers. However, only limited novel solutions are provided for image encryption, and limiting visual cryptography to ...
Navid Abapour, Mohsen Ebadpour
doaj +1 more source
A Recursive Threshold Visual Cryptography Scheme [PDF]
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter ...
Kak, Subhash, Parakh, Abhishek
core +1 more source
Ubic: Bridging the gap between digital cryptography and the physical world
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman +6 more
core +1 more source
A cheating prevention EVC scheme using watermarking techniques
Visual Cryptography (VC), proposed by Naor and Shamir in 1994, is a variation of the conventional secret sharing scheme. In VC, instead of a numerical secret key, a secret image is shared among participants in the form of images called shares.
Angelina Espejel Trujillo +3 more
doaj +1 more source
Generate Animated CAPTCHA Based on Visual Cryptography Concept [PDF]
CAPTCHA is a standard security technology. To date, the most commonly used are various types of visual CAPTCHAs, in which a challenge often appears as an image of distorted text that the user must decipher. The proposed scheme is used visual cryptography
Akbas E. Ali +2 more
doaj +1 more source
Blind and robust images watermarking based on wavelet and edge insertion
This paper gives a new scheme of watermarking technique related to insert the mark by adding edge in HH sub-band of the host image after wavelet decomposition.
Karim, Attoumani Mohamed +1 more
core +1 more source
Image Security using Visual Cryptography [PDF]
Informations are being transferred through open channels and the security of those informations has been prime concerns. Apart from many conventional cryptographic schemes, visual cryptographic techniques have also been in use for data and information ...
Bhuyan, Sangeeta
core
Bounds for visual cryptography schemes
In this paper, we investigate the best pixel expansion of the various models of visual cryptography schemes. In this regard, we consider visual cryptography schemes introduced by Tzeng and Hu [13]. In such a model, only minimal qualified sets can recover the secret image and that the recovered secret image can be darker or lighter than the background ...
Hajiabolhassan, Hossein, Cheraghi, Abbas
openaire +2 more sources
Magic sheets: Visual cryptography with common shares
Visual cryptography (VC) is an encryption technique for hiding a secret image in distributed and shared images (referred to as shares). VC schemes are employed to encrypt multiple images as meaningless, noisy patterns or meaningful images.
Naoki Kita, Kazunori Miyata
doaj +1 more source
Extended capabilities for visual cryptography
An extended visual cryptography scheme, for an access structure \((\Gamma_{Qual},\Gamma_{Forb})\) on a set of \(n\) participants, is a technique to encode \(n\) images in such a way that when we stack together the transparencies associated to participants in any set \(X \in \Gamma_{\text{Qual}}\) we get the secret message with no trace of the original ...
BLUNDO, Carlo +3 more
openaire +3 more sources

