Results 21 to 30 of about 85,998 (202)
Secret Image Sharing Based on Encrypted Pixels
The well-known Thien and Lin's (k, n) secret image sharing (SIS) scheme and its extended versions are threshold schemes, in which a secret image is shared among n shadow images and it can be recovered from any k shadow images.
Zhili Zhou +3 more
doaj +1 more source
A Construction Method of (2, 3) Visual Cryptography Scheme
Visual cryptography scheme (VCS) shares a binary secret image into multiple shadows, stacking qualified set of shadows will decode the secret image without computer resources.
Peng Li +3 more
doaj +1 more source
CMY Color Spaced-Based Visual Cryptography Scheme for Secret Sharing of Data
Visual cryptography technique allows visual information to be encrypted in such a way that the decrypted information appears as a visual image. Visual cryptography allows digital images to be separate into few shares called transparent shares.
Anli Sherine +4 more
semanticscholar +1 more source
Boolean Operation Based Visual Cryptography
A ( $k$ , $n$ )-Traditional Visual Cryptographic Scheme (VCS) based on basis matrices encoded a secret image into $n$ shadow images distributed among $n$ participants.
Zhili Zhou +3 more
doaj +1 more source
Visual Secret Sharing Using Cryptography
The Visual Cryptography Scheme (VCS) is a kind of secret sharing scheme that focuses on sharing secret im- ages. The basic idea of the visual cryptography scheme is to split a secret image into number of random shares (printed on transparencies) which separately reveals no information about the secret image other than the size of the secret image.
Shital B. Pawar, Prof.N.M. Shahane
openaire +1 more source
Meaningful Share Generation for Increased Number of Secrets in Visual Secret‐Sharing Scheme [PDF]
This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noise‐like (meaningless) shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers′ attention.
openaire +1 more source
Two new color (n, n)-secret sharing schemes
Two methods of(n,n)-secret sharing scheme for color images were presented.Decryption was processed by XOR operation.The reconstruction complexity of the proposed scheme is equivalent to the visual secret sharing scheme,furthermore the quality of the ...
YI Feng +3 more
doaj +2 more sources
Fault-Tolerant Visual Secret Sharing Schemes without Pixel Expansion
Visual cryptography encrypts a secret image into two meaningless random images, called shares, such that it can be decrypted by human vision without any calculations.
Justie Su-Tzu Juan +2 more
doaj +1 more source
Cheating Prevention and Detection Technique in Visual Secret Sharing
Visual secret sharing (VSS) has various applications such as visual authentication, access control, steganography, watermarking etc. But there is a possibility of cheating or collusive attack in VSS, where some malicious participants can mislead other ...
Mainejar Yadav, Ranvijay
semanticscholar +1 more source
Secret Image Enhanced Sharing Using Visual Cryptography
In the conventional visual cryptographic scheme, an image is divided into several image shares, which are distributed among the members of a group, and the original image is retrieved by combining the shares of all the members.
Brindha K., Jeyanthi N.
doaj +1 more source

