Blesswin et al., 2020 - Google Patents
RETRACTED ARTICLE: Enhanced semantic visual secret sharing scheme for the secure image communicationBlesswin et al., 2020
- Document ID
- 4019542291329793211
- Author
- Blesswin J
- Raj C
- Sukumaran R
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
Sharing multimedia information through the means of internet has increased many folds in this digital world. Information needs to be send across various secure channel as it contains sensitive data such as bank account details, medical reports or any financial documents …
- 230000000007 visual effect 0 title abstract description 49
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/448—Rendering the image unintelligible, e.g. scrambling
- H04N1/4486—Rendering the image unintelligible, e.g. scrambling using digital data encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3269—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
- H04N2201/327—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ye et al. | An effective framework for chaotic image encryption based on 3D logistic map | |
Ke et al. | Generative steganography with Kerckhoffs’ principle | |
Chen et al. | Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map | |
Kumar et al. | Enhancing multi‐tenancy security in the cloud computing using hybrid ECC‐based data encryption approach | |
Blesswin et al. | RETRACTED ARTICLE: Enhanced semantic visual secret sharing scheme for the secure image communication | |
Selva Mary et al. | Secure grayscale image communication using significant visual cryptography scheme in real time applications | |
Rashmi et al. | [Retracted] Enhanced Lorenz‐Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare | |
Hu et al. | Batch image encryption using generated deep features based on stacked autoencoder network | |
Kengnou Telem et al. | A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network | |
Guo et al. | A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem | |
Neela et al. | Blockchain based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment | |
Nag et al. | An efficient Boolean based multi-secret image sharing scheme | |
Shivani | Multi secret sharing with unexpanded meaningful shares | |
Geetha et al. | Optimal visual cryptographic scheme with multiple share creation for multimedia applications | |
Gutte et al. | Sailfish invasive weed optimization algorithm for multiple image sharing in cloud computing | |
Bhat et al. | A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography | |
Liu et al. | Exploiting lsb self-quantization for plaintext-related image encryption in the zero-trust cloud | |
Zhang et al. | A privacy protection framework for medical image security without key dependency based on visual cryptography and trusted computing | |
Halagowda et al. | Image encryption method based on hybrid fractal-chaos algorithm | |
Saha et al. | Secret image sharing schemes: A comprehensive survey | |
Wang et al. | Progressive secret image sharing scheme using meaningful shadows | |
Geetha et al. | Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications | |
Choudhary et al. | Competitive swarm improved invasive weed optimization-based secret sharing scheme for visual cryptography | |
Yuan et al. | Secret image sharing scheme with threshold changeable capability | |
Bao et al. | Color image encryption based on lite dense-ResNet and bit-XOR diffusion |