Visual Cryptography Scheme with Essential Participants

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Digital Watermarking Scheme with Visual Cryptography

The aim of this paper is to propose a novel digital watermarking scheme using visual cryptography. A binary image, called watermark, is split into two shares via a 2-out-of-2 visual secret sharing scheme. Then, one of the shares is embedded into the host image, and the other is held by the owner. When proving the ownership, the owner has to extract the embedded share and recover the watermark w...

متن کامل

A Novel Weighted Visual Cryptography Scheme with High Visual Quality

Visual Cryptography (VC) has been developed to encode a secret image into n shares for n participants in the past decades, in which each share is treated with the same priority. However, the privilege for participants in a group is not always the same. In this paper, a weighted visual cryptography scheme is proposed such that each participant obtains her/his share with different weight accordin...

متن کامل

Extended Visual Cryptography Scheme for Secret Hiding

Visual Cryptography is based on cryptography where n images are encoded in a way that only the human visual system can decrypt the hidden message without any cryptographic computations when all shares are stacked together. This paper presents an improved algorithm based on Chang’s and Yu visual cryptography scheme for hiding a colored image into multiple colored cover images. This scheme achiev...

متن کامل

New Region Incrementing Visual Cryptography Scheme

Recently, Wang introduced a novel (2, n) region incrementing visual cryptography scheme (RIVCS), which can gradually reconstruct visual secrets with multiple secrecy levels in a single image. A secret image is divided into multiple regions, where each region has a certain level of secrecy. Any t shadow images, where 2tn, can be used to reveal (t1) levels of secrets. However, in Wang’s scheme...

متن کامل

Visual Cryptography Scheme to Predict Phishing Sites

Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. In this paper we have proposed a new approach named as "A Novel Antiphishing framework based on visual cryptography" to solve the problem of phishing. Here an im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematics

سال: 2020

ISSN: 2227-7390

DOI: 10.3390/math8050838