• Nenhum resultado encontrado

[PDF] Top 20 A New Visual Cryptography Scheme for Color Images

Has 10000 "A New Visual Cryptography Scheme for Color Images" found on our website. Below are the top 20 most common "A New Visual Cryptography Scheme for Color Images".

A New Visual Cryptography Scheme for Color Images

A New Visual Cryptography Scheme for Color Images

... Visual cryptography is a method for protecting image-based secrets that has a computation-free decoding ...a visual cryptographic system which can be used to hide the original image information from ... See full document

4

A VC-Based Copyright Protection Scheme for Digital Images of Multi-Authorship

A VC-Based Copyright Protection Scheme for Digital Images of Multi-Authorship

... a new cryptographic paradigm, called visual cryptography or visual secret sharing (VSS), was firstly introduced by Naor and Shamir ...VSS scheme, the secret is visible only when at ... See full document

5

INVOLUTORY MATRIX IN VISUAL CRYPTOGRAPHY

INVOLUTORY MATRIX IN VISUAL CRYPTOGRAPHY

... and color images, For grayscale images, the modulus will be 256 (the number of levels is considered as the number of ...of color images, the color image is first decomposed into ... See full document

5

State-of-the-Art Visual Cryptography Schemes

State-of-the-Art Visual Cryptography Schemes

... techniques Visual Cryptography, which is a new technique which provides information security which uses simple algorithm unlike the complex, computationally intensive algorithms used in other ... See full document

9

Automatic eye localization in color images

Automatic eye localization in color images

... In general, eye localization methods consist on classifiers built using a combination of well-known approaches for pattern recognition and machine learning: neural networks, SVM, boosting, regression, Bayesian modeling, ... See full document

8

New Colors for Histology: Optimized Bivariate Color Maps Increase Perceptual Contrast in Histological Images.

New Colors for Histology: Optimized Bivariate Color Maps Increase Perceptual Contrast in Histological Images.

... this visual diagnostic process is determined by a number of ...the visual system of the evaluating pathologist [8, ...the visual system of an observer and that therefore, a propor- tion of the ... See full document

22

A novel cryptographic technique under visual secret sharing scheme for binary images

A novel cryptographic technique under visual secret sharing scheme for binary images

... This paper presented a new visual sharing scheme with (3, 6) and (4, 4) for visual cryptography. The proposed scheme reduced the no. of shares for more participants compared to ... See full document

12

Animal detection in natural images: effects of color and image database.

Animal detection in natural images: effects of color and image database.

... The visual system has a remarkable ability to extract categorical information from complex natural ...natural images. We used a new natural image database (ANID) that is free of some of the potential ... See full document

14

IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY

IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY

... halftone images, or halftone ...significant visual information to the reviewers, such as landscapes, buildings, ...the visual quality obtained by the new method is significantly better than ... See full document

10

Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares

Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares

... and visual cryptography concepts were combined by George Abboud to share the hidden ...use visual cryptography for banking ...that visual cryptography based signature ... See full document

12

Visual Digital Signature Scheme: A New Approach

Visual Digital Signature Scheme: A New Approach

... a visual cryptography (VC) for binary ...a new digital signature scheme based on the concept of a non-expansion visual ...A visual digital signature scheme is a method to ... See full document

9

DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUAL CRYPTOGRAPHY

DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUAL CRYPTOGRAPHY

... a scheme based on torus automorphism and visual ...protection scheme based on chaos and VC techniques. The limitation of the scheme is that it does not provide the main characteristic of VC ... See full document

8

Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Scheme

Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Scheme

... the scheme, one pixel of the original image is reproduced by m sub pixels on the ...different images with different combinations of ...n}. Visual cryptography is based on Boolean ...applying ... See full document

5

Multi-pixel Visual Cryptography for color images with Meaningful Shares

Multi-pixel Visual Cryptography for color images with Meaningful Shares

... Different kernels of halftone (Figure 3.9) are compared. Stucki kernel gives better halftone visual quality. Shares before watermark are random dots so it does not reveal the secret information. For better ... See full document

10

New Steganographic Scheme Based Of Reed- Solomon Codes

New Steganographic Scheme Based Of Reed- Solomon Codes

... The word detection is also used when it is about of checking the presence of information (represented thanks to a signal, a particular characteristic of the medium…) in the stego- medium, without to want to extract it ... See full document

9

Acceptance / Rejection Rule Based Algorithm for Multiple Face Detection in Color Images

Acceptance / Rejection Rule Based Algorithm for Multiple Face Detection in Color Images

... 1. Images for experiments are taken from internet to check the reliability of system against large range of intensity variation in input ...face images with different face size and with different face ...As ... See full document

7

DIGITAL WATERMARKING SCHEMES FOR AUTHORIZATION AGAINST COPYING OR PIRACY OF COLOR IMAGES

DIGITAL WATERMARKING SCHEMES FOR AUTHORIZATION AGAINST COPYING OR PIRACY OF COLOR IMAGES

... The Discrete Wavelet Transform (DWT)[8] is currently used in a wide variety of signal processing applications, such as in audio and video compression, removal of noise in audio, and the simulation of wireless antenna ... See full document

6

Color evaporation induced rapidity gaps

Color evaporation induced rapidity gaps

... using color evaporation is free of parameters and therefore predicts absolute rates, as well as their dependence on kinematic ...the color evaporation calculation correctly accom- modates the absolute gap ... See full document

9

Color Image Reconstruction Using A New R'G'I Model

Color Image Reconstruction Using A New R'G'I Model

... different images. The proposed conversion was tested using an original color image to get the gray image and without applying any processing we got the color image using inverse conversion, the ... See full document

5

New Time based User Security Scheme for Smart Cards

New Time based User Security Scheme for Smart Cards

... Abstract- User Security is an important technology to guarantee that only the legal users can access resources from the remote server. The advantages of smart cards are storage and computation abilities. Recently, there ... See full document

5

Show all 10000 documents...