Visual Cryptography: A Review
نویسندگان
چکیده
منابع مشابه
Traceable Visual Cryptography Traceable Visual Cryptography
In this paper we present a new k out of n visual cryptography scheme which does not only meet the requirements of the basic visual cryptography scheme deened by Naor and Shamir 5] but is also traceable. With a k out of n scheme it is not possible to reveal the original secret by stacking less than k transparencies. In general one can assume that it is very unlikely that there are k shareholders...
متن کاملReversible Data Hiding using Visual Cryptography: A Review
Data security and data integrity are the two challenging areas for research. There are so many research is progressing on the field like internet security, steganography, cryptography. Data hiding are a group of techniques used to put a secure data in a host media with small deterioration in host and the means to extract the secure data afterwards. Reversible data hiding is a technique to embed...
متن کاملVisual Cryptography
In this paper we consider a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations. The scheme is perfectly secure and very easy to implement. We extend it into a visual variant of the k out of n secret sharing problem, in which a dealer provides a transparency to each one of the n users; any k of them can see the image by stacking their trans...
متن کاملAbstract—Rotation Visual Cryptography
Rotation Visual Cryptography Written by Administrator Tuesday, 15 March 2011 09:44 Last Updated Monday, 21 March 2011 07:44 Visual cryptography scheme is the concept of encrypting a secret image into n(more than one) shares.Rotation Visual Cryptography scheme (RVCS) allows four secret images to be encrypted into two shares. Using Human Visual System, again the four secret images can be easily r...
متن کاملAbstract—Rotation Visual Cryptography
Rotation Visual Cryptography Written by Administrator Tuesday, 15 March 2011 09:44 Last Updated Monday, 21 March 2011 07:44 Visual cryptography scheme is the concept of encrypting a secret image into n(more than one) shares.Rotation Visual Cryptography scheme (RVCS) allows four secret images to be encrypted into two shares. Using Human Visual System, again the four secret images can be easily r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2017
ISSN: 0975-8887
DOI: 10.5120/ijca2017915406