Sciweavers

977 search results - page 3 / 196
» Secret image sharing
Sort
View
PR
2010
116views more  PR 2010»
13 years 5 months ago
Secret image sharing based on cellular automata and steganography
Z. Eslami, S. H. Razzaghi, J. Zarepour Ahmadabadi
ICIP
2008
IEEE
14 years 1 months ago
A novel video encryption technique based on secret sharing
The rapid growth of the Internet and digitized content made video distribution simpler. Hence the need for video data protection is on the rise. In this paper, we propose a secure...
Chigullapally Narsimha Raju, Ganugula Umadevi, Kan...
IANDC
2007
106views more  IANDC 2007»
13 years 7 months ago
Extended visual cryptography schemes
Visual cryptography schemes have been introduced in 1994 by Naor and Shamir. Their idea was to encode a secret image into n shadow images and to give exactly one such shadow image ...
Andreas Klein, Markus Wessler
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
13 years 11 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 7 months ago
Recursive Information Hiding in Visual Cryptography
: Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret shar...
Sandeep Katta