COALA - System for Visual Representation of Cryptography Algorithms
نویسندگان
چکیده
منابع مشابه
An Implementation of Algorithms in Visual Cryptography in Images
Visual Cryptography is a new Cryptography technique which is used to secure the images. In Visual Cryptography the Image is divided into parts called shares and then they are distributed to the participants. The Decryption side just stacking the share images gets the image. The initial model developed only for the bi-level or binary images or monochrome images. Later it was advanced to suit for...
متن کاملTraceable Visual Cryptography Traceable Visual Cryptography
In this paper we present a new k out of n visual cryptography scheme which does not only meet the requirements of the basic visual cryptography scheme deened by Naor and Shamir 5] but is also traceable. With a k out of n scheme it is not possible to reveal the original secret by stacking less than k transparencies. In general one can assume that it is very unlikely that there are k shareholders...
متن کاملA Novel Visual Cryptography Coding System for Jam Resistant Communication
A form of visual jam resistant coding is presented. Using Visual BBC, a modified form of BBC (Baird, Bahn, Collins) coding, it is shown that several images can be printed on clear plastic, such that when they are superimposed (i.e., a bitwise OR of the pixels is performed), the resulting image may look random, but the original images can still be recovered without any information about the orig...
متن کاملA Visual Cryptography based system for sharing multiple secret images
A Visual Cryptography (VC)-based system for sharing multiple secret images is proposed. Several weighted transparencies are generated so that people can reveal multiple secret images by stacking qualified subsets of some transparencies together. The transparency with relatively larger weight decides which secret image will be revealed. The proposed method has the following characteristics: deco...
متن کاملVisual Cryptography
In this paper we consider a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations. The scheme is perfectly secure and very easy to implement. We extend it into a visual variant of the k out of n secret sharing problem, in which a dealer provides a transparency to each one of the n users; any k of them can see the image by stacking their trans...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Learning Technologies
سال: 2014
ISSN: 1939-1382
DOI: 10.1109/tlt.2014.2315992