Results 61 to 70 of about 2,287,880 (206)

Developing a Visual Cryptography Tool for Arabic Text

open access: yesIEEE Access, 2019
Over the years, cryptography has been used to encrypt secret data. A new version of cryptography, entitled visual cryptography (VC), has been introduced.
Suliman A. Alsuhibany
doaj   +1 more source

Online Voting System Based on Image Steganography and Visual Cryptography

open access: yesJournal of Computing and Information Technology, 2017
This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. The system was implemented in Java EE on a web-based interface, with MySQL database server and Glassfish application server as the ...
Biju Issac   +2 more
doaj   +1 more source

Maximal Independent Sets for the Pixel Expansion of Graph Access Structure

open access: yesInternational Journal of Industrial Engineering and Production Research, 2008
: A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their ...
M. Hadian Dehkordi, A. Cheraghi
doaj   +2 more sources

A Survey on Key(s) and Keyless Image Encryption Techniques

open access: yesCybernetics and Information Technologies, 2017
As in recent years digital data transmission and image application have been increasing, maintaining secure transmission of image is of high importance. Image Encryption is implemented to achieve security on image applications.
Ranjan Kumar H. S.   +3 more
doaj   +1 more source

Colour visual cryptography schemes

open access: yesIET Information Security, 2008
Visual cryptography scheme (VCS) is a kind of secret-sharing scheme which allows the encryption of a secret image into n shares that are distributed to n participants. The beauty of such a scheme is that, the decryption of the secret image requires neither the knowledge of cryptography nor complex computation.
F. Liu, C.K. Wu, X.J. Lin
openaire   +1 more source

Privacy-preserving remote sensing images recognition based on limited visual cryptography

open access: yesCAAI Transactions on Intelligence Technology, 2023
Denghui Zhang   +4 more
semanticscholar   +1 more source

General Meaningful Shadow Construction in Secret Image Sharing

open access: yesIEEE Access, 2018
Secret image sharing (SIS) is an important technique for image protection. Several shadows are produced in SIS through scrambling pixel values and their correlations of a secret image.
Xuehu Yan, Yuliang Lu, Lintao Liu
doaj   +1 more source

Extended visual cryptography systems

open access: yes, 2003
10 ...
Klein, Andreas, Wessler, Markus
openaire   +2 more sources

An XOR-Based (k, n) Visual Fully Independent Secrets Sharing Scheme with Meaningful Shares

open access: yesApplied Sciences
With the rapid advancement of technology, data transmission security has become an increasingly critical issue. Visual Cryptography Scheme (VCS) provides a secure method for sharing secret images without complex computation—by stacking multiple shares ...
Wen-Ting Lee, Justie Su-Tzu Juan
doaj   +1 more source

Visual cryptography [PDF]

open access: yes, 1995
Moni Naor, Adi Shamir
openaire   +1 more source

Home - About - Disclaimer - Privacy