Results 51 to 60 of about 30,954 (223)

The Visual Secret Sharing Scheme Based on the Rgb Color System [PDF]

open access: yes, 2017
The visual secret sharing (VSS) scheme is a method to maintain the confidentiality of a se-cret image by sharing it to some number participants.
Adithia, M. T. (Mariskha)   +1 more
core  

A Randomized Kernel-Based Secret Image Sharing Scheme

open access: yes, 2018
This paper proposes a ($k,n$)-threshold secret image sharing scheme that offers flexibility in terms of meeting contrasting demands such as information security and storage efficiency with the help of a randomized kernel (binary matrix) operation.
Akella, Ravi Tej   +2 more
core   +1 more source

Biometric Security Through Visual Encryption for Fog Edge Computing

open access: yesIEEE Access, 2017
Fog and mobile edge computing have gained considerable attention from the research and development community. The problems related to security and privacy of biometric content are simpler to solve through edge computing resulting in improved security and
Wadood Abdul   +5 more
doaj   +1 more source

Effect of Dual Reinforcement on Wear Resistance by Aluminum Compacts Reinforce by SiC, Al2O3 [PDF]

open access: yesEngineering and Technology Journal, 2009
The producing composite materials of dual reinforcement in which the matrix material is aluminum reinforced with two types of ceramic particles : which are Alumina (50μmKeywordscomposite materials; wear test ; Al2O3; SiC ...
Mohammed Waheed, Hassan Abed
doaj   +1 more source

A Novel Latin Square Image Cipher

open access: yes, 2012
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson   +45 more
core   +1 more source

Colored visual cryptography without color darkening

open access: yesTheoretical Computer Science, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
S. CIMATO   +2 more
openaire   +4 more sources

Fortifying E-Voting Systems: Integrating Visual Cryptography with ECC and ChaCha20-Poly1305 for Enhanced Security

open access: yesJournal of Communications Software and Systems
The growing reliance on digital technologies demands an urgent advancement of a secure framework for remote voting systems. This paper proposes a novel e-voting framework which is reinforced by a combination of visual cryptography, elliptic curve ...
Gaurav Thakur   +3 more
doaj   +1 more source

Hybrid Techniques for Proposed Intelligent Digital Image Watermarking [PDF]

open access: yesEngineering and Technology Journal, 2015
Digital watermarking provides a solution of the recent problems such as a copyright protection and digital content authentication, as well as the balancing between the copyright protection and authentication requirements are the challenge of the many ...
Bashar S Mahdi, Alia K. Abdul Hassan
doaj   +1 more source

Phishing Techniques in Mobile Devices

open access: yes, 2018
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to
Amro, Belal
core   +1 more source

Skema Proteksi Hak Cipta untuk Citra Warna Digital Menggunakan Visual Cryptography

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2016
Currently, cases of misuse of intellectual property such as digital image have occurred frequently. Copyright protection needs to be done to reduce the occurrence of cases of misuse of a digital image by an unauthorized person.
Septia Rani, Agus Harjoko
doaj   +1 more source

Home - About - Disclaimer - Privacy