Segment Based Visual Cryptography For Key Distribution

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Segment Based Visual Cryptography for Key Distribution

Security is playing a vital role in this era of information technology, it has become a prerequisite in the digital world for maintaining the secrecy of the information. Many techniques have been proposed for handling textual data, maintenance of confidentiality of pictographic data is also becoming a priority. The trend of pictographic data hiding is pixel based, here a version of Visual Crypt...

متن کامل

Privacy Preserving through Segment-based Visual Cryptography

The role of privacy in the digital world is an essential criterion and confidentiality of pictographic data has added significance to the study of security. A version of visual cryptography for hiding textual data which is based on sixteen segment display is presented. The secret that is in the form of alpha numeric and special characters is converted into segment display and is then encrypted ...

متن کامل

FUZZY OBSERVER DESIGN WITH n-SHIFT MULTIPLE KEY FOR CRYPTOGRAPHY BASED ON 3D HYPERCHAOTIC OSCILLATOR

A fuzzy observer based scheme for synchronizing two hyperchaoticoscillators via a scalar transmitted signal for cryptographic application isproposed. The Takagi-Sugeno fuzzy model exactly represents chaotic systems.Based on the general fuzzy model, the fuzzy observer of a chaotic system isdesigned on the basis of the n-shift multiple state based key encryption algorithm.The scalar transmitted s...

متن کامل

A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks

This paper takes advantages of the symmetrical key and asymmetrical key technologies, and proposes a key distribution scheme based on public key cryptography. This scheme does not need to pre-distribute pair-wise keys. Pair-wise key is set up between two nodes after deployment according to a specific route algorithm. The scheme is able to guarantee there is a direct pair-wise key between two no...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Science & Engineering Survey

سال: 2012

ISSN: 0976-3252

DOI: 10.5121/ijcses.2012.3110