[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shrivas et al., 2015 - Google Patents

A survey on visual cryptography techniques and their applications

Shrivas et al., 2015

View PDF
Document ID
9878721647423090743
Author
Shrivas B
Yadav S
Publication year
Publication venue
International Journal of Computer Science and Information Technologies

External Links

Snippet

Image cryptography is emerging field of the research. There are various techniques has been established for cryptography. The many encryption techniques have been used for hide the visual information (pictures, text, etc.) in images. The main idea of encryption is …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCODING OR CIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices

Similar Documents

Publication Publication Date Title
Yang et al. Steganography and authentication in image sharing without parity bits
Chang et al. Sharing secrets in stego images with authentication
Rad et al. A new fast and simple image encryption algorithm using scan patterns and XOR
US20190363876A1 (en) Methods and Apparatus for Cryptography
Gafsi et al. Efficient encryption system for numerical image safe transmission
Koppu et al. A fast enhanced secure image chaotic cryptosystem based on hybrid chaotic magic transform
Pavithra et al. A survey on the techniques of medical image encryption
Chanu et al. A survey paper on secret image sharing schemes
Horng et al. Blockchain‐based reversible data hiding for securing medical images
Gao et al. An authenticatable (2, 3) secret sharing scheme using meaningful share images based on hybrid fractal matrix
Panwar et al. Towards deep learning for efficient image encryption
Shrivas et al. A survey on visual cryptography techniques and their applications
Saha et al. Secret image sharing schemes: A comprehensive survey
Atee et al. Cryptography and image steganography using dynamic encryption on LSB and color image based data hiding
Van Rensburg et al. 3D object watermarking from data hiding in the homomorphic encrypted domain
Akkasaligar et al. Multilevel security for medical image using heterogeneous chaotic map and deoxyribonucleic acid sequence operations
Ganesamoorthy et al. A Novel Design of an Image Encryption and Decryption Scheme Using Enhanced Cybersecurity Principles
Dawood et al. A Comprehensive Review of Color Image Encryption Technology
Jassbi et al. A new method for image encryption using chaotic permutation
Shrivas et al. Visual cryptography in the video using halftone technique
Meghana et al. A new method for secret image transmission via mosaic fragments using ecc key
Mustafa et al. A Review of Combined Effect of Cryptography & Steganography Techniques to Secure the Information
Aravindh et al. A Visual Cryptographic Scheme for Colour QR Codes in Defence
Singla et al. A comprehensive review on secure image steganography
James et al. A novel security architecture for biometric templates using visual cryptography and chaotic image encryption