Results 61 to 70 of about 30,954 (223)

An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]

open access: yes, 2014
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core  

Improved scheme and evaluation method for progressive visual cryptography

open access: yesEURASIP Journal on Information Security, 2022
Visual cryptography (VC) is a powerful technique with high security and requires no PC or device to reconstruct the secret information. Progressive visual cryptography (PVC) is a variation of the VC scheme in which the quality of the reconstructed image ...
Binh Le Thanh Thai   +2 more
doaj   +1 more source

Efficient Visual Cryptography

open access: yesJournal of Emerging Technologies in Web Intelligence, 2010
Visual cryptography scheme (VCS) is a secret- sharing scheme which allows the encryption of a secret image into n shares that are distributed to n participants. The beauty of such a scheme is that, the decryption of the secret image requires neither the knowledge of cryptography nor complex computation. Colour visual cryptography becomes an interesting
openaire   +1 more source

Pembuatan Perangkat Lunak Media Pembelajaran Kriptografi Klasik [PDF]

open access: yes, 2010
The development of the technology has making it as one of the main media of information changing. Not all the information is open for public. Because internet is a public-computer-network, then it needed an effort to keep the security of that information.
Hallim, Abd.   +2 more
core  

Progressive color visual cryptography [PDF]

open access: yesJournal of Electronic Imaging, 2005
Visual cryptography is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that can be stacked together to approximately recover the original image.
openaire   +1 more source

The (n, n) Visual Multi-Secrets Sharing Scheme with Abilities of OR and XOR Decryption

open access: yesEngineering Proceedings
Naor and Shamir introduced the fundamental concept of visual cryptography (VC) in 1994. In that model, the secret image is split into two meaningless shares, allowing the secret to be revealed and recognized by the human eye just by superimposing the two
An-Hui Lo, Justie Su-Tzu Juan
doaj   +1 more source

Overcoming Alignment Problem in Non-Identical Mathematical Support Visual Cryptography Schemes

open access: yesJournal of ICT Research and Applications, 2018
An important problem in visual cryptography is the alignment problem. Although Liu, et al. have proposed a method for aligning the shares, there is still a problem with the non-identical mathematical support visual cryptography schemes.
Ari Moesriami Barmawi, Widhian Bramantya
doaj   +1 more source

Improving Multi-pixel Visual Quality of Invariant Visual Cryptography Scheme

open access: yesInternational Journal of Computational Intelligence Systems
A visual cryptography scheme (VCS) splits the secret image into several shares. Stacking a certain number of shares will reveal the secret image. The principle algorithm (deterministic algorithm) retains the size of shares, and the revealed image is at ...
Maged Wafy
doaj   +1 more source

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES [PDF]

open access: yes
Visual secret sharing schemes (VSS) represent an important concept of visual cryptography. They permit the sharing of a secret image between multiple participants so that only authorized groups can recover the secret.
Ruxandra Olimid
core  

Home - About - Disclaimer - Privacy