Enhanced Visual Cryptography: An Augmented Model for Image Security
TLDR
Two schemes to secure information in the form of images, found to be more secure than existing visual cryptographic scheme and are more reliable and imperceptible are presented.About:
This article is published in Procedia Computer Science.The article was published on 2020-01-01 and is currently open access. It has received 5 citations till now. The article focuses on the topics: Visual cryptography & Cryptography.read more
Citations
More filters
Journal ArticleDOI
Secure Online Voting System using Visual Cryptography
TL;DR: In this paper, a secure online voting system using visual cryptography is proposed, where visual information can be encrypted on the user side, with the information decrypted on the admin side, which can be helpful in allowing participation in voting systems securely and ensuring fast vote counting and monitoring of the voting process.
Journal ArticleDOI
Role of Artificial Intelligence in Computer Science
Kunal,Muskan Rana +1 more
TL;DR: This is done by exhibiting both the prehistoric remains and the castle itself through many forms of technological support, including multimedia interactive applications and artificial intelligence functions alongside computerized simulations.
Implementation of STAGO-VCs to Secure the Food Grain Distribution System
TL;DR: In this article , a new Smart Ration Card technique has been proposed, which is based on a dual authentication mechanism that also fulfils the security of biometric data and maintains individual information.
Journal Article
Analytical algebical vibrant analysis
TL;DR: In this article, the authors present four different algorithms for the estimation of the kinematic structure of a robotic manipulator to determine the optimal manipulator for a given task, which can lower the cost of the manipulator and allow it to achieve poses that might be inaccessible by universal manipulators in an existing constrained environment.
Journal ArticleDOI
A study and analysis of image security algorithms and the current challenges
TL;DR: The current trends in the direction of image data security is explored, which covers methods for image dataSecurity, tools and techniques, current challenges along with suggestive measures, and the mitigating ways and directions to achieve high level image data safety in the means of data communication.
References
More filters
Visual Cryptography
Moni Naor,Adi Shamir +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Proceedings ArticleDOI
An extended visual cryptography scheme without pixel expansion for halftone images
TL;DR: This paper proposes a method for processing halftone images that improves the quality of the share images and the recovered secret image in an extended visual cryptography scheme for which the size of the shares and the recoverable image is the same as for the original halftones secret image.
Posted Content
New Visual Cryptography Algorithm For Colored Image
TL;DR: The proposed algorithm is for color image, that presents a system which takes four pictures as an input and generates three images which correspond to three of the four input pictures, so the forth picture is reconstructed by printing the three output images onto transparencies and stacking them together.
Journal ArticleDOI
A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes
TL;DR: An enhanced form of the proposed method based on the concept of visual cryptography for color images and without any pixel expansion which requires less space is produced by modifying the encryption technique used to generate the random and the key shares.