Academic literature on the topic 'Visual cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Visual cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Visual cryptography"
Et. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.
Full textPriya, R. Shanmuga, and A. Senthilkumar. "A Study on Visual Cryptography for Colour Images." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (August 1, 2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.
Full textPawar, Shital B., and Prof N. M. Shahane. "Visual Secret Sharing Using Cryptography." International Journal of Engineering Research 3, no. 1 (January 1, 2014): 31–33. http://dx.doi.org/10.17950/ijer/v3s1/108.
Full textShi, Yi-Shi, and Xiu-Bo Yang. "Invisible Visual Cryptography *." Chinese Physics Letters 34, no. 11 (November 2017): 114204. http://dx.doi.org/10.1088/0256-307x/34/11/114204.
Full textShaikh, Rizwan, Shreyas Siddh, Tushar Ravekar, and Sanket Sugaonkar. "Visual Cryptography Survey." International Journal of Computer Applications 134, no. 2 (January 15, 2016): 10–12. http://dx.doi.org/10.5120/ijca2016907806.
Full textZhi Zhou, G. R. Arce, and G. Di Crescenzo. "Halftone visual cryptography." IEEE Transactions on Image Processing 15, no. 8 (August 2006): 2441–53. http://dx.doi.org/10.1109/tip.2006.875249.
Full textRan-Zan Wang and Shuo-Fang Hsu. "Tagged Visual Cryptography." IEEE Signal Processing Letters 18, no. 11 (November 2011): 627–30. http://dx.doi.org/10.1109/lsp.2011.2166543.
Full textUno, Katsuhiro, and Hoang Hoa Tien Dung. "Visual Cryptography by Speckle Pattern Illumination." Journal of the Institute of Industrial Applications Engineers 4, no. 1 (January 25, 2016): 26–32. http://dx.doi.org/10.12792/jiiae.4.26.
Full textAswad, Firas Mohammed, Ihsan Salman, and Salama A. Mostafa. "An optimization of color halftone visual cryptography scheme based on Bat algorithm." Journal of Intelligent Systems 30, no. 1 (January 1, 2021): 816–35. http://dx.doi.org/10.1515/jisys-2021-0042.
Full textVaya, Dipesh, Sarika Khandelwal, and Teena Hadpawat. "Visual Cryptography: A Review." International Journal of Computer Applications 174, no. 5 (September 15, 2017): 40–43. http://dx.doi.org/10.5120/ijca2017915406.
Full textDissertations / Theses on the topic "Visual cryptography"
Muecke, Innes. "Greyscale and colour visual cryptography." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0017/MQ48283.pdf.
Full textWeir, J. P. "Visual cryptography and its applications." Thesis, Queen's University Belfast, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.557852.
Full textIslam, Naveed. "Cryptography based Visual Data Protection." Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.
Full textDue to the advancements in the information and communication technologies, the transmission of multimedia data over secure or insecure communication channels has increased exponentially. The security of data in applications like safe storage, authentications, copyright protection,remote military image communication or confidential video-conferencing require new strategies for secure transmission. Two techniques are commonly used for the secure transmission of visual data, i.e. cryptography and steganography. Cryptography achieves security by using secret keysto make the data illegible while steganography aims to hide the data in some innocent carrier signal. For shared trust and distributed environment, secret sharing schemes provide sufficient security in various communication applications. The principal objective of this thesis is to achieveprotection of visual data especially images through modern cryptographic techniques. In this context, the focus of the work in perspective, is twofolded. The first part of our work focuses on the security of image data in shared environment while the second part focuses on the integrity ofimage data in the encrypted domain during transmission.We proposed a new sharing scheme for images which exploits the additive and multiplicative homomorphic properties of two well known public key cryptosystems, namely, the RSA and the Paillier. In traditional secret sharing schemes, the dealer partitions the secret into shares and distributethe shares to each of the player. Thus, none of the involved players participate in the creation of the shared secret and there is always a possibilitythat the dealer can cheat some player. On the contrary, the proposed approach employs the secret sharing scheme in a way that limits the influence of the dealer over the protocol by allowing each player to participate. The second part of our thesis emphasizes on the integrity of visual data during transmission. Data integrity means that the data have its complete structure during any operation like storage, transfer or retrieval. A single bit change in encrypted data can have catastrophic impact over the decrypted data. We address the problem of error correction in images encrypted using symmetric key cryptosystem of the Advanced Encryption Standard (AES) algorithm. Three methods are proposed to exploit the local statistics of the visual data and the encryption algorithm to successfully correct the errors
Ghiotto, Nicolo' <1994>. "Visual Cryptography Schemes with Multiple Secrets and Visual Key Derivation." Master's Degree Thesis, Università Ca' Foscari Venezia, 2018. http://hdl.handle.net/10579/13323.
Full textMoretto, Tommaso <1992>. "Secure 2D barcodes based on visual cryptography." Master's Degree Thesis, Università Ca' Foscari Venezia, 2018. http://hdl.handle.net/10579/13391.
Full textMacPherson, Lesley. "Grey Level Visual Cryptography for General Access Structures." Thesis, University of Waterloo, 2002. http://hdl.handle.net/10012/1126.
Full textKoshta, Prashant Kumar, and Shailendra Singh Thakur. "A Novel Authenticity of an Image Using Visual Cryptography." IJCSN, 2012. http://hdl.handle.net/10150/219514.
Full textA digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentication, data integrity, and non-repudiation, especially within the electronic commerce environment. Currently, most conventional digital signature schemes are based on mathematical hard problems. These mathematical algorithms require computers to perform the heavy and complex computations to generate and verify the keys and signatures. In 1995, Naor and Shamir proposed a visual cryptography (VC) for binary images. VC has high security and requires simple computations. The purpose of this thesis is to provide an alternative to the current digital signature technology. We introduce a new digital signature scheme based on the concept of a non-expansion visual cryptography. A visual digital signature scheme is a method to enable visual verification of the authenticity of an image in an insecure environment without the need to perform any complex computations. We proposed scheme generates visual shares and manipulates them using the simple Boolean operations OR rather than generating and computing large and long random integer values as in the conventional digital signature schemes currently in use.
Maheshwari, Varun. "Data confidentiality and keyword search in the cloud using visual cryptography." Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=106553.
Full textLa sécurité a émergé comme l'aspect le plus redouté de l'informatique en nuage et comme un obstacle majeur pour les clients. Le cadre actuel de l'informatique en nuage ne permet pas que les données chiffrées soient stockées en raison de l'absence de schémas efficaces de cryptage qui permettent l'exécution des requêtes sur une base de données des nuages. Le stockage des données non cryptées expose les données non seulement à un agresseur extérieur, mais aussi au fournisseur de nuage lui-même. Ainsi, faire confiance à un fournisseur avec des données confidentielles est très risqué.Afin de permettre des requêtes sur une base de données des nuages sans compromettre la confidentialité des données, nous proposons d'utiliser l'obscurcissement des données à travers la cryptographie visuelle. Un nouveau schéma pour la cryptographie visuelle est développé et configuré pour le nuage pour stocker et récupérer des données textuelles. Tester le système avec l'exécution des requêtes sur une base de données nuée indique une grande précision dans la récupération des enregistrements avec négligeables faux positifs. En outre, le système est résistant aux attaques de l'intérieur et l'extérieur du nuage. Parce que le cryptage standard et la gestion des clés sont évités, notre approche est mathématiquement efficace et la confidentialité des données est assurée.
Leung, Wing Pan. "Visual cryptography for color images : formal security analysis and new construction /." access full-text access abstract and table of contents, 2009. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-cs-b23759100f.pdf.
Full text"Submitted to Department of Computer Science in partial fulfillment of the requirements for the degree of Master of Philosophy." Includes bibliographical references (leaves 103-108)
Potay, Sunny. "Efficient algorithm to construct phi function in vector space secret sharing scheme and application of secret sharing scheme in Visual Cryptography." TopSCHOLAR®, 2012. http://digitalcommons.wku.edu/theses/1151.
Full textBooks on the topic "Visual cryptography"
Yan, Bin, Yong Xiang, and Guang Hua. Improving Image Quality in Visual Cryptography. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-13-8289-5.
Full textVisual cryptography and secret image sharing. Boca Raton, FL: Taylor & Francis, 2011.
Find full textLiu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09644-5.
Full textLiu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23473-1.
Full textCryptography for Visual Basic: A programmer's guide to the Microsoft CryptoAPI. New York: John Wiley, 2000.
Find full textDu bon usage des images: Autour des codes visuels en Chine et au Japon = About images and visual codes in China and Japan. Saint-Denis: Presses universitaires de Vincennes, 2008.
Find full textK, kokula Krishna Hari, ed. Multi-secret Semantic Visual Cryptographic Protocol for Securing Image Communications: ICCS 2014. Bangkok, Thailand: Association of Scientists, Developers and Faculties, 2014.
Find full textKUMAR, Pratheek PRAVEEN. Steganography Using Visual Cryptography. Independently Published, 2018.
Find full textBhagat, Ruchir Ruchir, Shiksha Shiksha Suvarna, and Pratheek Praveen Pratheek Praveen Kumar. Steganography Using Visual Cryptography. Independently Published, 2017.
Find full textKumar, Pratheek Praveen, Ruchir Bhagat, and Shiksha Suvarna. Steganography Using Visual Cryptography. Independently Published, 2019.
Find full textBook chapters on the topic "Visual cryptography"
D’Arco, Paolo, and Roberto De Prisco. "Visual Cryptography." In Innovative Security Solutions for Information Technology and Communications, 20–39. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47238-6_2.
Full textOthman, Asem, and Arun Ross. "Visual Cryptography." In Encyclopedia of Biometrics, 1–11. Boston, MA: Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_9077-2.
Full textNaor, Moni, and Adi Shamir. "Visual cryptography." In Advances in Cryptology — EUROCRYPT'94, 1–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0053419.
Full textMihailescu, Marius Iulian, and Stefania Loredana Nita. "Visual Cryptography." In Cryptography and Cryptanalysis in MATLAB, 153–58. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7334-0_12.
Full textOthman, Asem, and Arun Ross. "Visual Cryptography." In Encyclopedia of Biometrics, 1572–81. Boston, MA: Springer US, 2015. http://dx.doi.org/10.1007/978-1-4899-7488-4_9077.
Full textBiehl, Ingrid, and Susanne Wetzel. "Traceable visual cryptography." In Information and Communications Security, 61–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0028462.
Full textFreeman, Adam. "Cryptography and Security." In Introducing Visual C# 2010, 1185–200. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3172-1_37.
Full textJones, Allen, and Adam Freeman. "Security and Cryptography." In Visual C# 2010 Recipes, 543–95. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-2526-3_11.
Full textLiu, Feng, and Wei Qi Yan. "Various Visual Cryptography Schemes." In Visual Cryptography for Image Processing and Security, 63–108. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09644-5_3.
Full textLiu, Feng, and Wei Qi Yan. "Various Visual Cryptography Schemes." In Visual Cryptography for Image Processing and Security, 83–129. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23473-1_4.
Full textConference papers on the topic "Visual cryptography"
Ashutosh and Sayan Dev Sen. "Visual Cryptography." In 2008 International Conference on Advanced Computer Theory and Engineering (ICACTE). IEEE, 2008. http://dx.doi.org/10.1109/icacte.2008.184.
Full textHsu, Shuo-Fang, Yu-Jie Chang, Ran-Zan Wang, Yeuan-Kuen Lee, and Shih-Yu Huang. "Verifiable Visual Cryptography." In 2012 Sixth International Conference on Genetic and Evolutionary Computing (ICGEC). IEEE, 2012. http://dx.doi.org/10.1109/icgec.2012.150.
Full textGupta, Ankit, and Kshitiz Saxena. "Region incrementing visual cryptography." In 2014 International Conference on Medical Imaging, m-Health and Emerging Communication Systems (MedCom). IEEE, 2014. http://dx.doi.org/10.1109/medcom.2014.7006012.
Full textWang, Guangyu, Feng Liu, and Wei Qi Yan. "Braille for Visual Cryptography." In 2014 IEEE International Symposium on Multimedia (ISM). IEEE, 2014. http://dx.doi.org/10.1109/ism.2014.70.
Full textDu, Ruofei, Eric Lee, and Amitabh Varshney. "Tracking-Tolerant Visual Cryptography." In 2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR). IEEE, 2019. http://dx.doi.org/10.1109/vr.2019.8797924.
Full textArce, Gonzalo R., Zhi Zhou, and Giovanni Di Crescenzo. "Visual cryptography via halftoning." In Electronic Imaging 2004, edited by Reiner Eschbach and Gabriel G. Marcu. SPIE, 2003. http://dx.doi.org/10.1117/12.532655.
Full textYang, Xiubo, Tuo Li, and Yishi Shi. "Indirect visual cryptography scheme." In Applied Optics and Photonics China (AOPC2015), edited by Chunhua Shen, Weiping Yang, and Honghai Liu. SPIE, 2015. http://dx.doi.org/10.1117/12.2202771.
Full textPatil, Bhagyashree S., and S. R. Khot. "Contrast Enhanced Visual Cryptography." In 2022 International Conference on Futuristic Technologies (INCOFT). IEEE, 2022. http://dx.doi.org/10.1109/incoft55651.2022.10094341.
Full textJiao, Shuming, Jun Feng, Yang Gao, Ting Lei, and Xiaocong Yuan. "Single-pixel Visual Cryptography." In Frontiers in Optics. Washington, D.C.: OSA, 2020. http://dx.doi.org/10.1364/fio.2020.fm7d.4.
Full textKrishnan S., Gopi, and D. Loganathan. "Color image cryptography scheme based on visual cryptography." In 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011). IEEE, 2011. http://dx.doi.org/10.1109/icsccn.2011.6024584.
Full text