[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Blesswin et al., 2020 - Google Patents

RETRACTED ARTICLE: Enhanced semantic visual secret sharing scheme for the secure image communication

Blesswin et al., 2020

Document ID
4019542291329793211
Author
Blesswin J
Raj C
Sukumaran R
Publication year
Publication venue
Multimedia Tools and Applications

External Links

Snippet

Sharing multimedia information through the means of internet has increased many folds in this digital world. Information needs to be send across various secure channel as it contains sensitive data such as bank account details, medical reports or any financial documents …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3269Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
    • H04N2201/327Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes

Similar Documents

Publication Publication Date Title
Ye et al. An effective framework for chaotic image encryption based on 3D logistic map
Ke et al. Generative steganography with Kerckhoffs’ principle
Chen et al. Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map
Kumar et al. Enhancing multi‐tenancy security in the cloud computing using hybrid ECC‐based data encryption approach
Blesswin et al. RETRACTED ARTICLE: Enhanced semantic visual secret sharing scheme for the secure image communication
Selva Mary et al. Secure grayscale image communication using significant visual cryptography scheme in real time applications
Rashmi et al. [Retracted] Enhanced Lorenz‐Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare
Hu et al. Batch image encryption using generated deep features based on stacked autoencoder network
Kengnou Telem et al. A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network
Guo et al. A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem
Neela et al. Blockchain based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment
Nag et al. An efficient Boolean based multi-secret image sharing scheme
Shivani Multi secret sharing with unexpanded meaningful shares
Geetha et al. Optimal visual cryptographic scheme with multiple share creation for multimedia applications
Gutte et al. Sailfish invasive weed optimization algorithm for multiple image sharing in cloud computing
Bhat et al. A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography
Liu et al. Exploiting lsb self-quantization for plaintext-related image encryption in the zero-trust cloud
Zhang et al. A privacy protection framework for medical image security without key dependency based on visual cryptography and trusted computing
Halagowda et al. Image encryption method based on hybrid fractal-chaos algorithm
Saha et al. Secret image sharing schemes: A comprehensive survey
Wang et al. Progressive secret image sharing scheme using meaningful shadows
Geetha et al. Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications
Choudhary et al. Competitive swarm improved invasive weed optimization-based secret sharing scheme for visual cryptography
Yuan et al. Secret image sharing scheme with threshold changeable capability
Bao et al. Color image encryption based on lite dense-ResNet and bit-XOR diffusion