Special Issue: Real-Time Data Hiding and Visual Cryptography
نویسندگان
چکیده
منابع مشابه
Visual cryptography with extra ability of hiding confidential data
We present a two-in-one visual cryptography (VC) scheme that not only shares an image of moderate confidentiality between two noisy transparencies, but also hides in these two transparencies a more confidential text file describing the image. None of the transparencies alone can reveal anything about the image or text. Later, people can view the image by simply stacking the two transparencies; ...
متن کاملReversible Data Hiding using Visual Cryptography: A Review
Data security and data integrity are the two challenging areas for research. There are so many research is progressing on the field like internet security, steganography, cryptography. Data hiding are a group of techniques used to put a secure data in a host media with small deterioration in host and the means to extract the secure data afterwards. Reversible data hiding is a technique to embed...
متن کاملExtended Visual Cryptography Scheme for Secret Hiding
Visual Cryptography is based on cryptography where n images are encoded in a way that only the human visual system can decrypt the hidden message without any cryptographic computations when all shares are stacked together. This paper presents an improved algorithm based on Chang’s and Yu visual cryptography scheme for hiding a colored image into multiple colored cover images. This scheme achiev...
متن کاملAnalyzing Visual Cryptography with Watermark Hiding Technique
In this paper, a watermark hiding scheme based on Visual Cryptography and Discrete Wavelet Transform is proposed. The proposed method modifies the codebook of related works, and utilizes statistical average to offer better security. The proposed method also reduces the size of the codebook and probability of false positives when compared to the existing works. Experimental results prove that th...
متن کاملRecursive Information Hiding in Visual Cryptography
Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret sharing. The idea used is to hide smaller secrets in the shares of a larger secret without an expansion in the size of the latter.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Real-Time Image Processing
سال: 2018
ISSN: 1861-8200,1861-8219
DOI: 10.1007/s11554-018-0749-0