We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 4,199 results
  1. Security enhanced random grid visual cryptography scheme using master share and embedding method

    Visual cryptography scheme is one of the main branches of secret sharing. The image is converted into various shares and then recouped by overlap**...

    Neetha Francis, Thomas Monoth in International Journal of Information Technology
    Article 17 August 2023
  2. Visual Cryptography: An Emerging Technology

    In the present era, the data has become the most important asset for an individual, community and organization. Data handling and protection from...
    Gauri Kothekar, Pallavi Khatri, Geetanjali Surange in Communication, Networks and Computing
    Conference paper 2023
  3. XVC scheme-based secret sharing model with hybrid optimization algorithm for visual cryptography

    Visual cryptography (VC) is a model that permits visual data in an encrypted manner in such a way that decrypted data occurs in the form of visual...

    Manoj Kumar, Shashi Shekhar in Signal, Image and Video Processing
    Article 05 May 2024
  4. Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography

    Abstract

    An approach is proposed to protect user’s personal data stored on mobile devices running the Android OS, which combines multifactor...

    Article 01 December 2023
  5. Contrast-enhanced visual cryptography schemes based on block pixel patterns

    Block-wise visual cryptography scheme is size invariant and it provides perfect security. It eliminates pixel expansion and security problems but it...

    Article 18 May 2023
  6. Progressive meaningful visual cryptography for secure communication of grayscale medical images

    In the digital era, data transmission plays a crucial role, encompassing various forms such as text, images, and videos. Industries such as banking,...

    Ming Yan, Yueli Hu, Haikun Zhang in Multimedia Tools and Applications
    Article 23 September 2023
  7. A TTP watermarking protocol based on visual cryptography

    With the development of information technology, big data has had a positive impact on the development of various industries. All kinds of digital...

    Baiyan Wu, Yuwei Peng, Chao Wang in Multimedia Tools and Applications
    Article 17 May 2022
  8. Security enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful shares

    More and more visual cryptography (VC) schemes have been engaged by introducing computational operations, such as XOR, in the secret decoding phase....

    **-Wen Wu, Tzung-Her Chen in Multimedia Tools and Applications
    Article 08 September 2023
  9. An overview of visual cryptography techniques

    Visual cryptography is an encryption technique that decomposes secret images into multiple shares. These shares are digitally or physically...

    Dyala R. Ibrahim, Je Sen Teh, Rosni Abdullah in Multimedia Tools and Applications
    Article 21 July 2021
  10. A robust and secure zero-watermarking copyright authentication scheme based on visual cryptography and block G-H feature

    Zero-watermarking is a distortion-free technique for copyright protection and has become a research hotspot in the field of digital watermarking. In...

    Hui Shi, Yanni Li, ... Yonggong Ren in Multimedia Tools and Applications
    Article 23 April 2022
  11. A novel perfect contrast XOR-based visual cryptography scheme for multiple secrets

    Visual cryptography scheme (VCS) is a kind of secret sharing scheme that only relies on human visual system (HVS) without complicated calculation. In...

    Shu-Mei Liu, Hong-Mei Yang, ... Bin Yan in Multimedia Tools and Applications
    Article 21 May 2022
  12. A fake threshold visual cryptography of QR code

    Visual cryptography (VC) is a technique that can encrypt images without complicated calculation. As the image, the quick response (QR) code can also...

    Tao Liu, Bin Yan, ... Jeng-Shyang Pan in Multimedia Tools and Applications
    Article 30 April 2022
  13. Enhanced halftone-based secure and improved visual cryptography scheme for colour/binary Images

    Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the...

    Saleha Ahmad, Muhammad Faisal Hayat, ... Yasir Saleem in Multimedia Tools and Applications
    Article 23 July 2021
  14. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis

    In today's interconnected world, safeguarding digital data's confidentiality and security is crucial. Cryptography and steganography are two primary...

    Indy Haverkamp, Dipti K. Sarmah in International Journal of Information Security
    Article Open access 05 May 2024
  15. A Study for Security of Visual Cryptography

    We verify the achievement of information-theoretic security of Visual Cryptography (VC) based on the detailed attack scenario. In addition, practical...
    Binh Le Thanh Thai, Hidema Tanaka in Codes, Cryptology and Information Security
    Conference paper 2023
  16. Implementing Post-quantum Cryptography for Developers

    Widely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose...

    Julius Hekkala, Mari Muurman, ... Visa Vallivaara in SN Computer Science
    Article Open access 29 April 2023
  17. Testing the randomness of shares in color visual cryptography

    The concept of black-and-white visual cryptography with two truly random shares, previously applied to color images, was improved by mixing the...

    Leszek J. Chmielewski, Mariusz Nieniewski, Arkadiusz Orłowski in Pattern Analysis and Applications
    Article Open access 24 June 2021
  18. Secure video steganographic model using framelet transform and elliptic curve cryptography

    Information security holds a quintessential role in the era of digital communication. Nowadays, social media has become the new platform to share a...

    Sonali Rout, Ramesh Kumar Mohapatra in Multimedia Tools and Applications
    Article 28 August 2023
  19. Visual Cryptography

    So far you have seen several different approaches to cryptography. In this chapter, we discuss the “visual side” of cryptography, in which a message...
    Marius Iulian Mihailescu, Stefania Loredana Nita in Cryptography and Cryptanalysis in MATLAB
    Chapter 2021
  20. Authentic secret share creation techniques using visual cryptography with public key encryption

    In the digital transparent world, share the secret messages are challenged one. Visual cryptography (VC) is safer method for information transfer...

    M. Karolin, T. Meyyappan in Multimedia Tools and Applications
    Article 22 July 2021
Did you find what you were looking for? Share feedback.