Results 21 to 30 of about 85,998 (202)

Secret Image Sharing Based on Encrypted Pixels

open access: yesIEEE Access, 2018
The well-known Thien and Lin's (k, n) secret image sharing (SIS) scheme and its extended versions are threshold schemes, in which a secret image is shared among n shadow images and it can be recovered from any k shadow images.
Zhili Zhou   +3 more
doaj   +1 more source

A Construction Method of (2, 3) Visual Cryptography Scheme

open access: yesIEEE Access, 2020
Visual cryptography scheme (VCS) shares a binary secret image into multiple shadows, stacking qualified set of shadows will decode the secret image without computer resources.
Peng Li   +3 more
doaj   +1 more source

CMY Color Spaced-Based Visual Cryptography Scheme for Secret Sharing of Data

open access: yesWireless Communications and Mobile Computing, 2022
Visual cryptography technique allows visual information to be encrypted in such a way that the decrypted information appears as a visual image. Visual cryptography allows digital images to be separate into few shares called transparent shares.
Anli Sherine   +4 more
semanticscholar   +1 more source

Boolean Operation Based Visual Cryptography

open access: yesIEEE Access, 2019
A ( $k$ , $n$ )-Traditional Visual Cryptographic Scheme (VCS) based on basis matrices encoded a secret image into $n$ shadow images distributed among $n$ participants.
Zhili Zhou   +3 more
doaj   +1 more source

Visual Secret Sharing Using Cryptography

open access: yesInternational Journal of Engineering Research, 2014
The Visual Cryptography Scheme (VCS) is a kind of secret sharing scheme that focuses on sharing secret im- ages. The basic idea of the visual cryptography scheme is to split a secret image into number of random shares (printed on transparencies) which separately reveals no information about the secret image other than the size of the secret image.
Shital B. Pawar, Prof.N.M. Shahane
openaire   +1 more source

Meaningful Share Generation for Increased Number of Secrets in Visual Secret‐Sharing Scheme [PDF]

open access: yesMathematical Problems in Engineering, 2010
This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noise‐like (meaningless) shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers′ attention.
openaire   +1 more source

Two new color (n, n)-secret sharing schemes

open access: yesTongxin xuebao, 2007
Two methods of(n,n)-secret sharing scheme for color images were presented.Decryption was processed by XOR operation.The reconstruction complexity of the proposed scheme is equivalent to the visual secret sharing scheme,furthermore the quality of the ...
YI Feng   +3 more
doaj   +2 more sources

Fault-Tolerant Visual Secret Sharing Schemes without Pixel Expansion

open access: yesApplied Sciences, 2016
Visual cryptography encrypts a secret image into two meaningless random images, called shares, such that it can be decrypted by human vision without any calculations.
Justie Su-Tzu Juan   +2 more
doaj   +1 more source

Cheating Prevention and Detection Technique in Visual Secret Sharing

open access: yesIngénierie des Systèmes d Inf., 2020
Visual secret sharing (VSS) has various applications such as visual authentication, access control, steganography, watermarking etc. But there is a possibility of cheating or collusive attack in VSS, where some malicious participants can mislead other ...
Mainejar Yadav, Ranvijay
semanticscholar   +1 more source

Secret Image Enhanced Sharing Using Visual Cryptography

open access: yesCybernetics and Information Technologies, 2017
In the conventional visual cryptographic scheme, an image is divided into several image shares, which are distributed among the members of a group, and the original image is retrieved by combining the shares of all the members.
Brindha K., Jeyanthi N.
doaj   +1 more source

Home - About - Disclaimer - Privacy