منابع مشابه
Image Authentication using Visual Cryptography
This report gives a novel technique of image encryption and authentication by combining elements of Visual Cryptography and Public Key Cryptography. A prominent attack involving generation of fake shares to cheat honest users has been described and a demonstration of the proposed system employing a centralised server to generate shares and authenticate them on the basis of requests is made as a...
متن کاملImage Size Invariant Visual Cryptography
In the visual secret sharing scheme proposed by Naor and Shamir [3], a secret image is encoded into shares, of which size is larger than that of the secret image and the shares are decoded by stacking them without performing any cryptographic computation. In this paper we propose a (k, n) visual secret sharing scheme to encode a black-and-white image into the same size shares as the secret imag...
متن کاملNew Visual Cryptography Algorithm For Colored Image
Visual Cryptography is a special encryption technique to hide information in images, which divide secret image into multiple layers. Each layer holds some information. The receiver aligns the layers and the secret information is revealed by human vision without any complex computation. The proposed algorithm is for color image, that presents a system which takes four pictures as an input and ge...
متن کاملNew Algorithm for Halftone Image Visual Cryptography
Visual secret sharing is the technique that divide the secret image into n multiple shares. Each share constitutes some information and when k shares out of n stack together the secret will reveal. However; less than k shares are not work. The beauty of the visual secret sharing scheme is its decryption process i.e. to decrypt the secret using Human Visual System (HVS) without any computation. ...
متن کاملHalftone Image Watermarking based on Visual Cryptography
In this paper we have proposed digital watermarking scheme for halftone images based on visual cryptography scheme. The scheme does not embed the watermark directly on the halftone image instead watermark will be divided into the parts called as shares. The scheme not only protects the watermark but also provides an effective copyright protection scheme. At the time of watermark embedding verif...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2017
ISSN: 0975-8887
DOI: 10.5120/ijca2017915785