Visual Cryptography Using Hybrid Halftoning
نویسندگان
چکیده
منابع مشابه
Joint Screening Halftoning and Visual Cryptography for Image Protection
Since digital right management of digital media data has received considerable attention recently, protection of halftone image documents becomes another important topic. Image-based visual cryptography is found to provide an alternative for applications of copyright protection by overlapping more than one secret embedded image to show the hidden information. In this paper, we propose a novel s...
متن کاملJoint Screening Halftoning and Visual Cryptography for Halftone Image Protection
Since digital right management of digital media data has received considerable attention recently, protection of halftone image documents becomes another important topic. Imagebased visual cryptography is found to provide an alternative for applications of copyright protection by overlapping more than one secret embedded image to show the hidden information. In this paper, we propose a novel sc...
متن کاملHybrid inverse halftoning using adaptive filtering
We propose a novel fast inverse halftoning technique using a combination of spatial varying filtering and spatial invariant filtering. The proposed algorithm is significantly simpler than most existing algorithms. Without explicit edge region classification, the proposed spatial varying filter is shown to be capable of preserving edges effectively.
متن کاملImage Authentication using Visual Cryptography
This report gives a novel technique of image encryption and authentication by combining elements of Visual Cryptography and Public Key Cryptography. A prominent attack involving generation of fake shares to cheat honest users has been described and a demonstration of the proposed system employing a centralised server to generate shares and authenticate them on the basis of requests is made as a...
متن کاملVisual Cryptography Using Color Images
Information security has become a major issue as information technology is ruling the world. Cryptography using mathematical techniques is providing information security but requires complex algorithms, intensive mathematical computations and efficient computational resources. To avoid such intensive and complex algorithms a new scheme known as Visual cryptography (VC) was introduced by Naor an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Engineering
سال: 2012
ISSN: 1877-7058
DOI: 10.1016/j.proeng.2012.06.254