• No results found

[PDF] Top 20 A novel cryptographic technique under visual secret sharing scheme for binary images

Has 10000 "A novel cryptographic technique under visual secret sharing scheme for binary images" found on our website. Below are the top 20 most common "A novel cryptographic technique under visual secret sharing scheme for binary images".

A novel cryptographic technique under visual secret sharing scheme for binary images

A novel cryptographic technique under visual secret sharing scheme for binary images

... To prevent digital contents from being intercepted by unauthorized parties is a critical demand in information security. With the increasing popularity of the internet, which makes possible the instant access or ... See full document

12

A Review on Visual Secret Sharing Schemes

A Review on Visual Secret Sharing Schemes

... for binary images and gray scale images respectively using Boolean XOR and AND ...n) visual secret image sharing technique by using Boolean operations for encryption of n ... See full document

5

(n, n+1) Visual Secret Sharing Scheme Based on Local Binary Pattern Operator

(n, n+1) Visual Secret Sharing Scheme Based on Local Binary Pattern Operator

... For secret binary images, we can design (n,n+1) scheme to realize these images sharing and exact ...n images, we can give n+1 shadow blocks in circular or line or ... See full document

5

On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

... reconstructed secret image needs to perform Boolean XOR operation described in [15] while conventional VSS scheme performs Boolean OR ...the scheme described above is more complex than VSS schemes ... See full document

11

A Hybrid Visual Cryptographic Lossless Image Sharing Scheme based on Bit Sharing

A Hybrid Visual Cryptographic Lossless Image Sharing Scheme based on Bit Sharing

... introduced secret sharing scheme ...based scheme, threshold based schemes and Huffman coding schemes [1, 3, 5, ...of secret sharing scheme called Visual ... See full document

5

VCS & Lifting Wavelet Scheme Based Digital Image Security Technique

VCS & Lifting Wavelet Scheme Based Digital Image Security Technique

... grid visual secret sharing (RGVSS) method, which has gained more attention over the ...2)-threshold scheme. Both traditional VC and RGVSS produced meaningless share-images, which can ... See full document

12

Ideal Contrast Secret Sharing Scheme Through Meaningful Shares with Enveloping Digital Watermarking using Bit Plane based (k,n) VCS

Ideal Contrast Secret Sharing Scheme Through Meaningful Shares with Enveloping Digital Watermarking using Bit Plane based (k,n) VCS

... Cryptography Scheme (VCS) is an encryption method that works on human visual ...a secret image into n shares and decryption can be done only by stacking k or more share images without any ... See full document

6

A SIMPLE AND EFFICIENT VISUAL CRYPTOGRAPHY SCHEME FOR SHARING MULTIPLE SECRET IMAGES

A SIMPLE AND EFFICIENT VISUAL CRYPTOGRAPHY SCHEME FOR SHARING MULTIPLE SECRET IMAGES

... of technique for encipher the confidential visual information ...human visual system (HVS) without any complex process, providing high ...robust visual cryptography scheme is proposed. ... See full document

7

A Visual Cryptographic Encryption Technique for Securing Medical Images

A Visual Cryptographic Encryption Technique for Securing Medical Images

... a secret binary image into n shares of random binary ...The secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be ... See full document

5

A Three Way Visual Cryptography & its Application in biometric Security : A Review

A Three Way Visual Cryptography & its Application in biometric Security : A Review

... natural images. This proposed scheme is based on YCbCr color ...on visual cryptographic scheme This new scheme provides efficient computation to generate key and ...the ... See full document

11

A Review on Data Hididng using Steganography & Visual Cryptography

A Review on Data Hididng using Steganography & Visual Cryptography

... a technique which converts the data or simple text into an unreadable ...form. Visual cryptography schemes hide the secret image into two or more images which are called ...the secret ... See full document

6

Secure Color Visual Secret Sharing Scheme Using Shifting Coefficient with No Pixel Expansion

Secure Color Visual Secret Sharing Scheme Using Shifting Coefficient with No Pixel Expansion

... a visual cryptographic method for color images using the meaningful ...halftone technique is used along with the (CCT) cover coding table and (SCT) secret coding table for generating ... See full document

8

High Secure Gray Scale Images Sharing Using Visual Cryptography Secret Sharing Scheme

High Secure Gray Scale Images Sharing Using Visual Cryptography Secret Sharing Scheme

... n) visual secret sharing scheme using Boolean and shift operations that provides high security to the secret image is ...original secret image to generate n share images ... See full document

8

A novel secured Boolean based secret image 
		sharing scheme

A novel secured Boolean based secret image sharing scheme

... In secret image, white pixels are encoded into subpixels of two share images with [0 1] and [0 1] using the matrix S 0 and black pixels in the secret are encoded into subpixels of two share ... See full document

7

Shared Cryptographic Scheme with Efficient Data Recovery and Compression for Audio Secret Sharing

Shared Cryptographic Scheme with Efficient Data Recovery and Compression for Audio Secret Sharing

... the secret binary message, in the sense that the high volume segment corresponds to 1 and the low volume segment corresponds to 0 ...the secret. ASSS is a secret sharing scheme ... See full document

7

VISUAL CRYPTOGRAPHY FOR COLOR IMAGES

VISUAL CRYPTOGRAPHY FOR COLOR IMAGES

... a secret sharing scheme for encrypting a secret image, it is a perfectly secure way that allows secret sharing without any cryptographic computation, which is termed as ... See full document

5

A novel quality assessment for visual secret sharing schemes

A novel quality assessment for visual secret sharing schemes

... the secret. Graph-based visual saliency is adopted to perform an initial prediction of the ...the secret image are statistically ...For secret images in which the “temperate background ... See full document

15

Comparative Study Of Error Diffusion Algorithms With Raster Scan

Comparative Study Of Error Diffusion Algorithms With Raster Scan

... - Visual cryptography is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is ...Color ... See full document

5

ENCRYPTING MULTIPLE IMAGES USING VISUAL SECRET SHARING SCHEME

ENCRYPTING MULTIPLE IMAGES USING VISUAL SECRET SHARING SCHEME

... Abstract: Visual Cryptography is an encryption technique where a secret image is cryptographically encoded into n meaningless share ...for visual cryptography for natural images was ... See full document

9

Visual Secret Sharing Scheme Using Encrypting Multiple Images

Visual Secret Sharing Scheme Using Encrypting Multiple Images

... secure visual secret sharing ...VSS scheme as US-VSS schemes in this ...black–white binary secret images, the weak security notion discussed above was implicitly used ... See full document

6

Show all 10000 documents...