Search
Search Results
-
Security enhanced random grid visual cryptography scheme using master share and embedding method
Visual cryptography scheme is one of the main branches of secret sharing. The image is converted into various shares and then recouped by overlap**...
-
Visual Cryptography: An Emerging Technology
In the present era, the data has become the most important asset for an individual, community and organization. Data handling and protection from... -
XVC scheme-based secret sharing model with hybrid optimization algorithm for visual cryptography
Visual cryptography (VC) is a model that permits visual data in an encrypted manner in such a way that decrypted data occurs in the form of visual...
-
Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography
AbstractAn approach is proposed to protect user’s personal data stored on mobile devices running the Android OS, which combines multifactor...
-
Contrast-enhanced visual cryptography schemes based on block pixel patterns
Block-wise visual cryptography scheme is size invariant and it provides perfect security. It eliminates pixel expansion and security problems but it...
-
Progressive meaningful visual cryptography for secure communication of grayscale medical images
In the digital era, data transmission plays a crucial role, encompassing various forms such as text, images, and videos. Industries such as banking,...
-
A TTP watermarking protocol based on visual cryptography
With the development of information technology, big data has had a positive impact on the development of various industries. All kinds of digital...
-
Security enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful shares
More and more visual cryptography (VC) schemes have been engaged by introducing computational operations, such as XOR, in the secret decoding phase....
-
An overview of visual cryptography techniques
Visual cryptography is an encryption technique that decomposes secret images into multiple shares. These shares are digitally or physically...
-
A robust and secure zero-watermarking copyright authentication scheme based on visual cryptography and block G-H feature
Zero-watermarking is a distortion-free technique for copyright protection and has become a research hotspot in the field of digital watermarking. In...
-
A novel perfect contrast XOR-based visual cryptography scheme for multiple secrets
Visual cryptography scheme (VCS) is a kind of secret sharing scheme that only relies on human visual system (HVS) without complicated calculation. In...
-
A fake threshold visual cryptography of QR code
Visual cryptography (VC) is a technique that can encrypt images without complicated calculation. As the image, the quick response (QR) code can also...
-
Enhanced halftone-based secure and improved visual cryptography scheme for colour/binary Images
Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the...
-
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis
In today's interconnected world, safeguarding digital data's confidentiality and security is crucial. Cryptography and steganography are two primary...
-
A Study for Security of Visual Cryptography
We verify the achievement of information-theoretic security of Visual Cryptography (VC) based on the detailed attack scenario. In addition, practical... -
Implementing Post-quantum Cryptography for Developers
Widely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose...
-
Testing the randomness of shares in color visual cryptography
The concept of black-and-white visual cryptography with two truly random shares, previously applied to color images, was improved by mixing the...
-
Secure video steganographic model using framelet transform and elliptic curve cryptography
Information security holds a quintessential role in the era of digital communication. Nowadays, social media has become the new platform to share a...
-
Visual Cryptography
So far you have seen several different approaches to cryptography. In this chapter, we discuss the “visual side” of cryptography, in which a message... -
Authentic secret share creation techniques using visual cryptography with public key encryption
In the digital transparent world, share the secret messages are challenged one. Visual cryptography (VC) is safer method for information transfer...