A Keyless Approach for RDH in Encrypted Images using Visual Cryptography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Exchange Using 'Keyless Cryptography'

In a classical cryptosystem, as opposed to a public-key cryptosystem, communication between users is based on a secret key known to them, but no others. A key-distribution protocol is employed to distribute copies of this secret key to the users. One simple way to perform key-distribution makes use of out-of-band communication a diplomatic courier, for example. More desirable for a computer net...

متن کامل

Visual Cryptography Using Color Images

Information security has become a major issue as information technology is ruling the world. Cryptography using mathematical techniques is providing information security but requires complex algorithms, intensive mathematical computations and efficient computational resources. To avoid such intensive and complex algorithms a new scheme known as Visual cryptography (VC) was introduced by Naor an...

متن کامل

A Secure Visual Cryptography for Color Images

-A visual cryptography scheme is a secret sharing scheme to encode a secret image SI in such a way that any qualified subset of participants can ―visually‖ recover the secret image, while forbidden subsets have no information on SI. A ―visual‖ recovery consists of xeroxing the shares, which are shadow images, onto transparencies and stacking them one on the top of the others. The participants i...

متن کامل

Keyless Cryptography in Grid Computing Using Cyclic Shift Transposition Algorithm

Grid computing involves in the process of forming dynamic virtual organizations and associated resources in which the security is an important factor.Grid computing, is a distributed computing model in which new kind of systems are combined to form a heterogeneous computational resources such as computers, storage space, sensors, and experimental data. The grid can seamlessly, transparently and...

متن کامل

Improved Visual Cryptography Scheme using Hopfield for Halftone Images

Visual cryptography is an emerging cryptography technology that uses the characteristics of human vision to decrypt the encrypted images. Watermarking is a method in which an image or pattern is put on paper in the form of various shades of lightness/darkness especially when viewed by transmitted light. Digital watermarking where computer-aided information is used in the hiding information is o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2016

ISSN: 1877-0509

DOI: 10.1016/j.procs.2016.02.021