Results 41 to 50 of about 30,954 (223)

PiouCrypt: Decentralized lattice-based method for visual symmetric cryptography

open access: yesFranklin Open, 2023
In recent years, establishing secure visual communications has turned into one of the essential problems for security engineers and researchers. However, only limited novel solutions are provided for image encryption, and limiting visual cryptography to ...
Navid Abapour, Mohsen Ebadpour
doaj   +1 more source

A Recursive Threshold Visual Cryptography Scheme [PDF]

open access: yes, 2008
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter ...
Kak, Subhash, Parakh, Abhishek
core   +1 more source

Ubic: Bridging the gap between digital cryptography and the physical world

open access: yes, 2014
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman   +6 more
core   +1 more source

A cheating prevention EVC scheme using watermarking techniques

open access: yesRevista Facultad de IngenierĂ­a Universidad de Antioquia, 2012
Visual Cryptography (VC), proposed by Naor and Shamir in 1994, is a variation of the conventional secret sharing scheme. In VC, instead of a numerical secret key, a secret image is shared among participants in the form of images called shares.
Angelina Espejel Trujillo   +3 more
doaj   +1 more source

Generate Animated CAPTCHA Based on Visual Cryptography Concept [PDF]

open access: yesEngineering and Technology Journal, 2011
CAPTCHA is a standard security technology. To date, the most commonly used are various types of visual CAPTCHAs, in which a challenge often appears as an image of distorted text that the user must decipher. The proposed scheme is used visual cryptography
Akbas E. Ali   +2 more
doaj   +1 more source

Blind and robust images watermarking based on wavelet and edge insertion

open access: yes, 2013
This paper gives a new scheme of watermarking technique related to insert the mark by adding edge in HH sub-band of the host image after wavelet decomposition.
Karim, Attoumani Mohamed   +1 more
core   +1 more source

Image Security using Visual Cryptography [PDF]

open access: yes, 2015
Informations are being transferred through open channels and the security of those informations has been prime concerns. Apart from many conventional cryptographic schemes, visual cryptographic techniques have also been in use for data and information ...
Bhuyan, Sangeeta
core  

Bounds for visual cryptography schemes

open access: yesDiscrete Applied Mathematics, 2010
In this paper, we investigate the best pixel expansion of the various models of visual cryptography schemes. In this regard, we consider visual cryptography schemes introduced by Tzeng and Hu [13]. In such a model, only minimal qualified sets can recover the secret image and that the recovered secret image can be darker or lighter than the background ...
Hajiabolhassan, Hossein, Cheraghi, Abbas
openaire   +2 more sources

Magic sheets: Visual cryptography with common shares

open access: yesComputational Visual Media, 2018
Visual cryptography (VC) is an encryption technique for hiding a secret image in distributed and shared images (referred to as shares). VC schemes are employed to encrypt multiple images as meaningless, noisy patterns or meaningful images.
Naoki Kita, Kazunori Miyata
doaj   +1 more source

Extended capabilities for visual cryptography

open access: yesTheoretical Computer Science, 2001
An extended visual cryptography scheme, for an access structure \((\Gamma_{Qual},\Gamma_{Forb})\) on a set of \(n\) participants, is a technique to encode \(n\) images in such a way that when we stack together the transparencies associated to participants in any set \(X \in \Gamma_{\text{Qual}}\) we get the secret message with no trace of the original ...
BLUNDO, Carlo   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy