Shrivas et al., 2015 - Google Patents
A survey on visual cryptography techniques and their applicationsShrivas et al., 2015
View PDF- Document ID
- 9878721647423090743
- Author
- Shrivas B
- Yadav S
- Publication year
- Publication venue
- International Journal of Computer Science and Information Technologies
External Links
Snippet
Image cryptography is emerging field of the research. There are various techniques has been established for cryptography. The many encryption techniques have been used for hide the visual information (pictures, text, etc.) in images. The main idea of encryption is …
- 230000000007 visual effect 0 title abstract description 64
Classifications
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CODING OR CIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yang et al. | Steganography and authentication in image sharing without parity bits | |
Chang et al. | Sharing secrets in stego images with authentication | |
Rad et al. | A new fast and simple image encryption algorithm using scan patterns and XOR | |
US20190363876A1 (en) | Methods and Apparatus for Cryptography | |
Gafsi et al. | Efficient encryption system for numerical image safe transmission | |
Koppu et al. | A fast enhanced secure image chaotic cryptosystem based on hybrid chaotic magic transform | |
Pavithra et al. | A survey on the techniques of medical image encryption | |
Chanu et al. | A survey paper on secret image sharing schemes | |
Horng et al. | Blockchain‐based reversible data hiding for securing medical images | |
Gao et al. | An authenticatable (2, 3) secret sharing scheme using meaningful share images based on hybrid fractal matrix | |
Panwar et al. | Towards deep learning for efficient image encryption | |
Shrivas et al. | A survey on visual cryptography techniques and their applications | |
Saha et al. | Secret image sharing schemes: A comprehensive survey | |
Atee et al. | Cryptography and image steganography using dynamic encryption on LSB and color image based data hiding | |
Van Rensburg et al. | 3D object watermarking from data hiding in the homomorphic encrypted domain | |
Akkasaligar et al. | Multilevel security for medical image using heterogeneous chaotic map and deoxyribonucleic acid sequence operations | |
Ganesamoorthy et al. | A Novel Design of an Image Encryption and Decryption Scheme Using Enhanced Cybersecurity Principles | |
Dawood et al. | A Comprehensive Review of Color Image Encryption Technology | |
Jassbi et al. | A new method for image encryption using chaotic permutation | |
Shrivas et al. | Visual cryptography in the video using halftone technique | |
Meghana et al. | A new method for secret image transmission via mosaic fragments using ecc key | |
Mustafa et al. | A Review of Combined Effect of Cryptography & Steganography Techniques to Secure the Information | |
Aravindh et al. | A Visual Cryptographic Scheme for Colour QR Codes in Defence | |
Singla et al. | A comprehensive review on secure image steganography | |
James et al. | A novel security architecture for biometric templates using visual cryptography and chaotic image encryption |