Results 51 to 60 of about 85,998 (202)

SECURE VISUAL SECRET SHARING BASED ON DISCRETE WAVELET TRANSFORM [PDF]

open access: yesICTACT Journal on Image and Video Processing, 2015
Visual Cryptography Scheme (VCS) is an encryption method to encode secret written materials. This method converts the secret written material into an image. Then encode this secret image into n shadow images called shares.
S. Jyothi Lekshmi, A. R. Anil
doaj  

DIGITAL COLOR IMAGE ENCRYPTION BASED ON INVERTIBLE MATRIX WITH SECRET SHARING [PDF]

open access: yesICTACT Journal on Image and Video Processing, 2013
This paper explores the new approach to implement image encryption in digital color images. The self invertible matrix created from the original image is used as keys for the RGB to YCbCr transform and the secret sharing operations.
W.R. Sam Emmanuel, C. Edward Jaya Singh
doaj  

XOR-based unexpanded meaningful visual secret sharing scheme

open access: yesInt. J. Secur. Networks, 2019
Visual cryptography is a technique to conceal the secret information into n shares, distributed to n participants. When any k ≤ n, 2 ≤ k ≤ n, shares are printed on transparencies and stacked together, information about secret image can be revealed ...
S. P. Kannojia, J. Kumar
semanticscholar   +1 more source

Weighted visual secret sharing with multiple decryptions and lossless recovery.

open access: yesMathematical biosciences and engineering : MBE, 2019
Traditional visual secret sharing (VSS) encodes the original secret image into n shares, and each share is of equal importance. However, in some scenarios, we need to make a difference between the participants according to the levels of their importance.
Feng Liu, Xuehu Yan, Y. Lu, Longdan Tan
semanticscholar   +1 more source

Magic sheets: Visual cryptography with common shares

open access: yesComputational Visual Media, 2018
Visual cryptography (VC) is an encryption technique for hiding a secret image in distributed and shared images (referred to as shares). VC schemes are employed to encrypt multiple images as meaningless, noisy patterns or meaningful images.
Naoki Kita, Kazunori Miyata
doaj   +1 more source

Visual secret sharing scheme with (n, n) threshold based on WeChat Mini Program codes

open access: yesJournal of Visual Communication and Image Representation, 2022
Jia Chen   +4 more
semanticscholar   +1 more source

Secret Image Sharing using Visual Cryptography Shares with Acknowledgement

open access: yesInternational Journal of Innovative Technology and Exploring Engineering, 2019
Visual Cryptography is an encryption technique in which the secret image is encoded and divided into n meaningless images called shares. The shares look like black and white dots embedded randomly in an image. These shares don’t reveal any information about the original image.
Chandra Sekhar Sanaboina   +2 more
openaire   +1 more source

A New Repeating Color Watermarking Scheme Based on Human Visual Model

open access: yesEURASIP Journal on Advances in Signal Processing, 2004
This paper proposes a human-visual-model-based scheme that effectively protects the intellectual copyright of digital images. In the proposed method, the theory of the visual secret sharing scheme is used to create a master watermark share and a secret ...
Chang Chin-Chen, Tsai Chwei-Shyong
doaj   +1 more source

A Strongly Robust Secret Image Sharing Algorithm Based on QR Codes

open access: yesAlgorithms
Secret image sharing (SIS) is an image protection technique based on cryptography. However, traditional SIS schemes have limited noise resistance, making it difficult to ensure reconstructed image quality.
Pengcheng Huang, Canyu Chen, Xinmeng Wan
doaj   +1 more source

Meaningful And Unexpanded Shares For Visual Secret Sharing Schemes

open access: yes, 2015
In today s internet world it is very essential to secretly share biometric data stored in the central database. There are so many options to secretly share biometri c data using cryptographic computation. This work reviews and applies a perfectly secure method to secretly share biometric data,for possible use in biometric authentication and protection ...
Mr. V.B.Phadtare,, Dr. V.R. Ghorpade
openaire   +1 more source

Home - About - Disclaimer - Privacy