• No results found

Visual Secret Sharing

On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

... Traditional Secret Sharing (SS) schemes reconstruct secret exactly the same as the original one but involve complex ...computation. Visual Secret Sharing (VSS) schemes decode the ...

11

Enhancing Visual Secret Sharing Using Natural Shares

Enhancing Visual Secret Sharing Using Natural Shares

... true secret image and the original one is not visually ...size visual secret sharing scheme [4] based on hybrid ...on visual cryptography [5] to improve the display quality of recovered ...

7

Visual Secret Sharing Schemes for QR Code

Visual Secret Sharing Schemes for QR Code

... allows visual information (pictures, text, ...a visual secret sharing scheme, where an image was broken up into n shares so that only someone with all n shares could decrypt the image, while ...

5

A Survey on Various Visual Secret Sharing Schemes with an Application

A Survey on Various Visual Secret Sharing Schemes with an Application

... color visual secret sharing scheme using non-expanded meaningful shares with authentication was proposed by Der-Chyuan Lou et all ...proposal, visual secret sharing scheme for ...

5

A Review on Visual Secret Sharing Schemes

A Review on Visual Secret Sharing Schemes

... protect secret images or important data from being tampered or grabbed. Secret sharing scheme has turn into an important concept in information protection and ...The Visual Secret ...

5

ENCRYPTING MULTIPLE IMAGES USING VISUAL SECRET SHARING SCHEME

ENCRYPTING MULTIPLE IMAGES USING VISUAL SECRET SHARING SCHEME

... of secret information in the image form ...called visual cryptography in ...human visual system to identify. The first visual cryptography scheme is used for the black-and-white image in ...

9

Visual Secret Sharing Scheme Using Encrypting Multiple Images

Visual Secret Sharing Scheme Using Encrypting Multiple Images

... of secret information in the image form ...called visual cryptography in ...human visual system to identify. The first visual cryptography scheme is used for the black-and-white image in ...

6

Secure Color Visual Secret Sharing Scheme Using Shifting Coefficient with No Pixel Expansion

Secure Color Visual Secret Sharing Scheme Using Shifting Coefficient with No Pixel Expansion

... like visual secret sharing scheme has been proposed. Visual Secret Sharing actually hides a secret image in two cover images called share images and sends it via internet; ...

8

A novel quality assessment for visual secret sharing schemes

A novel quality assessment for visual secret sharing schemes

... for visual secret sharing schemes in 1994, which is also referred to as the deterministic visual secret sharing model ...original secret image. Thus, recent stud- ies ...

15

Visual Secret Sharing between Remote Participants

Visual Secret Sharing between Remote Participants

... The proposed methodology can find use in any situation requiring sharing of a binary image or code, such as a password or PIN number securely over the Internet, as well as using a mobile[r] ...

10

A Comprehensive Study on Various Visual cryptography Schemes with an Application

A Comprehensive Study on Various Visual cryptography Schemes with an Application

... reconstructed secret image when comparing with other ...color visual secret sharing scheme using non-expanded meaningful shares with authentication was proposed by Der-Chyuan Lou et all ...

5

VCS & Lifting Wavelet Scheme Based Digital Image Security Technique

VCS & Lifting Wavelet Scheme Based Digital Image Security Technique

... a visual secret sharing scheme capable of hiding a secret image and an extra confidential image within two meaningful cover ...the secret image without any complex ...revealed ...

12

Secret Image Sharing using Visual Cryptography Shares with Acknowledgement

Secret Image Sharing using Visual Cryptography Shares with Acknowledgement

... The security of the visual secret sharing schemes depends up on the column permutation of the base matrices. The shares may reveal the information of the original image if less number of column ...

8

High Secure Gray Scale Images Sharing Using Visual Cryptography Secret Sharing Scheme

High Secure Gray Scale Images Sharing Using Visual Cryptography Secret Sharing Scheme

... n) visual secret sharing scheme using Boolean and shift operations that provides high security to the secret image is ...original secret image to generate n share images using simple ...

8

A Three Way Visual Cryptography & its Application in biometric Security : A Review

A Three Way Visual Cryptography & its Application in biometric Security : A Review

... multi-secrets visual cryptography which is extended from traditional visual secret ...traditional visual secret sharing implemented to generate share images macro block by macro ...

11

Vol 12, No 1 (2014)

Vol 12, No 1 (2014)

... secrets sharing in visual ...reversible visual cryptography scheme is recommended by Fang ...a visual secret sharing scheme for suppressing multiple secret images into two ...

10

Watermarking and Cryptography Based Image Security Algorithms : A Survey Amit Kumar Sharma, Aman Kumar

Watermarking and Cryptography Based Image Security Algorithms : A Survey Amit Kumar Sharma, Aman Kumar

... a visual secret sharing method, namely visual cryptography (VC), which can encode a secret image into n noise-like ...The secret image can be decrypted by the human eye when any ...

9

A Competent and Speedy Symmetric Key Production with improved Latency Using Matrix Array Symmetric Key Encryption

A Competent and Speedy Symmetric Key Production with improved Latency Using Matrix Array Symmetric Key Encryption

... Image Secret Sharing via Error Diffusion in Halftone Visual Cryptography” [7] in this title author describe Visual Cryptography is an encryption technique where a secret image is ...

8

VISUAL CRYPTOGRAPHY FOR COLOR IMAGES

VISUAL CRYPTOGRAPHY FOR COLOR IMAGES

... for visual secret sharing is as follows. There is a secret picture to be shared among n ...the secret picture as a set of black and white pixels and handling each pixel separately ...

5

Secret Image sharing by use of Chaos based Visual Cryptography

Secret Image sharing by use of Chaos based Visual Cryptography

... the secret image from the shares without any ...(k,n) visual cryptography system any combination of k shares will regenerate the original secret image, less than k shares will generate noise like ...

11

Show all 10000 documents...

Related subjects