• Nenhum resultado encontrado

Multi-pixel Visual Cryptography for color images with Meaningful Shares

N/A
N/A
Protected

Academic year: 2017

Share "Multi-pixel Visual Cryptography for color images with Meaningful Shares"

Copied!
10
0
0

Texto

Loading

Imagem

Table 1 Construction of 2-out-of-2 scheme
Figure 2.1 Block Diagram of Multi-pixel Visual Cryptography with meaningful shares
Table 2.1 Error Diffusion Kernels (a) Floyd-steinberg  (b) Jarvis (c) Stucki
Figure 3.1 (a) Secret Image. (b) Filtered Secret Image
+5

Referências

Documentos relacionados

In cryptography we are using MD-5 Algorithm to encrypt a message and a part of message is hidden in DCT of an image, remaining part of the message is used to generate three ( 3

Based on the similarity of visual content for an given input query image, the task of medical image retrieval is to retrieve relevant medical images from an image repository.. Query

Cryptography or sometimes referred to as encipherment is used to convert the plaintext to encode or make unreadable form of text [1]. The sensitive data are

The position of the data is scrambled in the order of randomness of the elements obtained from the chaotic map and again rearranged back to their original position in

Keywords: Fool-Proof Lock-Key, Visual Cryptography, Visual Secret Sharing Scheme (VSSS), Secret Image, Sub

(New York Stock Exchange, NYSE), NASDAQ (National Association of Securities Dealers Automated Quotations),-. (Boston Stock Exchange), (Chicago Stock

To perform the shuffling of the plain- image’s pixels, a block and stream based shuffling scheme is proposed, in which the plain- image is decomposed into 8x8

Visual cryptography is used along with the concept of halftoning where the continuous-tone image is first transformed into a binary image by using error diffusion