Block Based Symmetry Key Visual Cryptography
نویسندگان
چکیده
منابع مشابه
Segment Based Visual Cryptography for Key Distribution
Security is playing a vital role in this era of information technology, it has become a prerequisite in the digital world for maintaining the secrecy of the information. Many techniques have been proposed for handling textual data, maintenance of confidentiality of pictographic data is also becoming a priority. The trend of pictographic data hiding is pixel based, here a version of Visual Crypt...
متن کاملA Two Round Block Cipher Symmetric Key Cryptography based on Key Stream
Data security is one of the challenges of all times. In the modern computer parlance it is important to secure the vital data. One of the common aspects of data security is the privacy for which Cryptography is the promising methodology. Cryptographic computations can be used in different concerned areas of computer communication for encrypting and transmitting the information. cryptography has...
متن کاملFUZZY OBSERVER DESIGN WITH n-SHIFT MULTIPLE KEY FOR CRYPTOGRAPHY BASED ON 3D HYPERCHAOTIC OSCILLATOR
A fuzzy observer based scheme for synchronizing two hyperchaoticoscillators via a scalar transmitted signal for cryptographic application isproposed. The Takagi-Sugeno fuzzy model exactly represents chaotic systems.Based on the general fuzzy model, the fuzzy observer of a chaotic system isdesigned on the basis of the n-shift multiple state based key encryption algorithm.The scalar transmitted s...
متن کاملXOR-based Visual Cryptography Schemes
A recent publication introduced a Visual Crypto (VC) system, based on the polarisation of light. This VC system has good resolution, contrast and colour properties. Mathematically, the VC system is described by the XOR operation (modulo two addition). In this paper we investigate Threshold Visual Secret Sharing schemes associated to XOR-based VC systems. Firstly, we show that n out of n schemes...
متن کاملNovel Non-expanded Visual Cryptography Scheme with Block Encoding
In the traditional visual cryptography, secret pixels are expanded to cause the size of the recovered image is larger than the original one. Although many researches successfully solve expansion problem, the quality of the recovered image is not better. In order to improve quality of reconstruction, this paper proposes a novel nonexpansion scheme. The principle of the proposed scheme is to divi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Network and Information Security
سال: 2012
ISSN: 2074-9090,2074-9104
DOI: 10.5815/ijcnis.2012.09.02