Results 61 to 70 of about 2,287,880 (206)
Developing a Visual Cryptography Tool for Arabic Text
Over the years, cryptography has been used to encrypt secret data. A new version of cryptography, entitled visual cryptography (VC), has been introduced.
Suliman A. Alsuhibany
doaj +1 more source
Online Voting System Based on Image Steganography and Visual Cryptography
This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. The system was implemented in Java EE on a web-based interface, with MySQL database server and Glassfish application server as the ...
Biju Issac +2 more
doaj +1 more source
Maximal Independent Sets for the Pixel Expansion of Graph Access Structure
: A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their ...
M. Hadian Dehkordi, A. Cheraghi
doaj +2 more sources
A Survey on Key(s) and Keyless Image Encryption Techniques
As in recent years digital data transmission and image application have been increasing, maintaining secure transmission of image is of high importance. Image Encryption is implemented to achieve security on image applications.
Ranjan Kumar H. S. +3 more
doaj +1 more source
Colour visual cryptography schemes
Visual cryptography scheme (VCS) is a kind of secret-sharing scheme which allows the encryption of a secret image into n shares that are distributed to n participants. The beauty of such a scheme is that, the decryption of the secret image requires neither the knowledge of cryptography nor complex computation.
F. Liu, C.K. Wu, X.J. Lin
openaire +1 more source
Privacy-preserving remote sensing images recognition based on limited visual cryptography
Denghui Zhang +4 more
semanticscholar +1 more source
General Meaningful Shadow Construction in Secret Image Sharing
Secret image sharing (SIS) is an important technique for image protection. Several shadows are produced in SIS through scrambling pixel values and their correlations of a secret image.
Xuehu Yan, Yuliang Lu, Lintao Liu
doaj +1 more source
Extended visual cryptography systems
10 ...
Klein, Andreas, Wessler, Markus
openaire +2 more sources
An XOR-Based (k, n) Visual Fully Independent Secrets Sharing Scheme with Meaningful Shares
With the rapid advancement of technology, data transmission security has become an increasingly critical issue. Visual Cryptography Scheme (VCS) provides a secure method for sharing secret images without complex computation—by stacking multiple shares ...
Wen-Ting Lee, Justie Su-Tzu Juan
doaj +1 more source

