Results 51 to 60 of about 2,287,880 (206)

Skema Proteksi Hak Cipta untuk Citra Warna Digital Menggunakan Visual Cryptography

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2016
Currently, cases of misuse of intellectual property such as digital image have occurred frequently. Copyright protection needs to be done to reduce the occurrence of cases of misuse of a digital image by an unauthorized person.
Septia Rani, Agus Harjoko
doaj   +1 more source

Improved scheme and evaluation method for progressive visual cryptography

open access: yesEURASIP Journal on Information Security, 2022
Visual cryptography (VC) is a powerful technique with high security and requires no PC or device to reconstruct the secret information. Progressive visual cryptography (PVC) is a variation of the VC scheme in which the quality of the reconstructed image ...
Binh Le Thanh Thai   +2 more
doaj   +1 more source

Secure Online Voting System using Visual Cryptography

open access: yes, 2021
The development of a secure online voting system using visual cryptography is highly essential for present voting systems. Based on the current requirements and design aspects of an existing online voting system, emerging technologies are required in ...
Meher Gayatri Devi Tiwari   +1 more
semanticscholar   +1 more source

Secret Image Enhanced Sharing Using Visual Cryptography

open access: yesCybernetics and Information Technologies, 2017
In the conventional visual cryptographic scheme, an image is divided into several image shares, which are distributed among the members of a group, and the original image is retrieved by combining the shares of all the members.
Brindha K., Jeyanthi N.
doaj   +1 more source

The (n, n) Visual Multi-Secrets Sharing Scheme with Abilities of OR and XOR Decryption

open access: yesEngineering Proceedings
Naor and Shamir introduced the fundamental concept of visual cryptography (VC) in 1994. In that model, the secret image is split into two meaningless shares, allowing the secret to be revealed and recognized by the human eye just by superimposing the two
An-Hui Lo, Justie Su-Tzu Juan
doaj   +1 more source

Overcoming Alignment Problem in Non-Identical Mathematical Support Visual Cryptography Schemes

open access: yesJournal of ICT Research and Applications, 2018
An important problem in visual cryptography is the alignment problem. Although Liu, et al. have proposed a method for aligning the shares, there is still a problem with the non-identical mathematical support visual cryptography schemes.
Ari Moesriami Barmawi, Widhian Bramantya
doaj   +1 more source

Efficient Visual Cryptography

open access: yesJournal of Emerging Technologies in Web Intelligence, 2010
Visual cryptography scheme (VCS) is a secret- sharing scheme which allows the encryption of a secret image into n shares that are distributed to n participants. The beauty of such a scheme is that, the decryption of the secret image requires neither the knowledge of cryptography nor complex computation. Colour visual cryptography becomes an interesting
openaire   +1 more source

Progressive color visual cryptography [PDF]

open access: yesJournal of Electronic Imaging, 2005
Visual cryptography is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that can be stacked together to approximately recover the original image.
openaire   +1 more source

Improving Multi-pixel Visual Quality of Invariant Visual Cryptography Scheme

open access: yesInternational Journal of Computational Intelligence Systems
A visual cryptography scheme (VCS) splits the secret image into several shares. Stacking a certain number of shares will reveal the secret image. The principle algorithm (deterministic algorithm) retains the size of shares, and the revealed image is at ...
Maged Wafy
doaj   +1 more source

A novel meaningful secret image sharing method based on Arabic letters

open access: yesKuwait Journal of Science, 2016
In recent years, the providing of information security for multimedia has become an important subject of study. Visual cryptography and secret sharing is protected image contents without using complex mathematically operators.
Derya Avci
doaj  

Home - About - Disclaimer - Privacy