Visual Cryptography Scheme with Essential Participants
نویسندگان
چکیده
منابع مشابه
Digital Watermarking Scheme with Visual Cryptography
The aim of this paper is to propose a novel digital watermarking scheme using visual cryptography. A binary image, called watermark, is split into two shares via a 2-out-of-2 visual secret sharing scheme. Then, one of the shares is embedded into the host image, and the other is held by the owner. When proving the ownership, the owner has to extract the embedded share and recover the watermark w...
متن کاملA Novel Weighted Visual Cryptography Scheme with High Visual Quality
Visual Cryptography (VC) has been developed to encode a secret image into n shares for n participants in the past decades, in which each share is treated with the same priority. However, the privilege for participants in a group is not always the same. In this paper, a weighted visual cryptography scheme is proposed such that each participant obtains her/his share with different weight accordin...
متن کاملExtended Visual Cryptography Scheme for Secret Hiding
Visual Cryptography is based on cryptography where n images are encoded in a way that only the human visual system can decrypt the hidden message without any cryptographic computations when all shares are stacked together. This paper presents an improved algorithm based on Chang’s and Yu visual cryptography scheme for hiding a colored image into multiple colored cover images. This scheme achiev...
متن کاملNew Region Incrementing Visual Cryptography Scheme
Recently, Wang introduced a novel (2, n) region incrementing visual cryptography scheme (RIVCS), which can gradually reconstruct visual secrets with multiple secrecy levels in a single image. A secret image is divided into multiple regions, where each region has a certain level of secrecy. Any t shadow images, where 2tn, can be used to reveal (t1) levels of secrets. However, in Wang’s scheme...
متن کاملVisual Cryptography Scheme to Predict Phishing Sites
Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. In this paper we have proposed a new approach named as "A Novel Antiphishing framework based on visual cryptography" to solve the problem of phishing. Here an im...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics
سال: 2020
ISSN: 2227-7390
DOI: 10.3390/math8050838