• Nenhum resultado encontrado

[PDF] Top 20 Multi-pixel Visual Cryptography for color images with Meaningful Shares

Has 10000 "Multi-pixel Visual Cryptography for color images with Meaningful Shares" found on our website. Below are the top 20 most common "Multi-pixel Visual Cryptography for color images with Meaningful Shares".

Multi-pixel Visual Cryptography for color images with Meaningful Shares

Multi-pixel Visual Cryptography for color images with Meaningful Shares

... of visual cryptography is visual quality of recovered ...presents Multi-pixel Visual Cryptography for color images to generate two meaningful ... See full document

10

State-of-the-Art Visual Cryptography Schemes

State-of-the-Art Visual Cryptography Schemes

... Visual cryptography schemes were applied to only black and white images until the year ...colored visual cryptography scheme was developed by Verheul and Van Tilborg [ 27 ] ...secret ... See full document

9

DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUAL CRYPTOGRAPHY

DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUAL CRYPTOGRAPHY

... secret images are generated before this ...deal with this security problems is Visual ...introduced Visual cryptography ...two shares Share1 and Share2. If pixel is white ... See full document

8

Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares

Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares

... of pixel values ...and visual cryptography concepts were combined by George Abboud to share the hidden ...of shares [5]. In 2008 the concept was proposed to use visual ... See full document

12

IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY

IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY

... two-out-of-two visual threshold scheme demonstrates a special case of k-out-of-n schemes ...minimum pixel expansion attainable can be found in ...scale, shares are still constructed by random binary ... See full document

10

A novel cryptographic technique under visual secret sharing scheme for binary images

A novel cryptographic technique under visual secret sharing scheme for binary images

... called visual cryptography. The primary property of visual cryptography is using a method called stacking shares to recover secret ...the shares on top of one ...more ... See full document

12

Elliptic curve cryptography in hardware for secure systems : a multi-use reconfigurable soft IP

Elliptic curve cryptography in hardware for secure systems : a multi-use reconfigurable soft IP

... In the last years, the industry of electronics and software has continually developed numerous electronic devices, which are able to access the Internet through some connec- tion, creating the internet of things. In ... See full document

74

Remote Sensing Image Retrieval with Combined Features Of Salient Region

Remote Sensing Image Retrieval with Combined Features Of Salient Region

... Human Visual System (HVS) because semantics are related to specific ...sensing images and then low-level features extracted from these salient objects are used for ...sensing images, visual ... See full document

6

Audio-Visual and Meaningful Semantic Context Enhancements in Older and Younger Adults.

Audio-Visual and Meaningful Semantic Context Enhancements in Older and Younger Adults.

... how visual and semantic cues are used by older and younger adults within the framework of a single ...of visual and semantic context enhancement ...use visual and semantic cues remains fairly ... See full document

14

Acceptance / Rejection Rule Based Algorithm for Multiple Face Detection in Color Images

Acceptance / Rejection Rule Based Algorithm for Multiple Face Detection in Color Images

... 2D color images with single or multiple ...skin color segmentation, morphological operations and last step is face rejection or ...Skin color segmentation works as a preprocessing step ... See full document

7

HISTOGRAM TECHNIQUE WITH PIXEL INDICATOR FOR HIGH FIDELITY STEGANOGRAPHY

HISTOGRAM TECHNIQUE WITH PIXEL INDICATOR FOR HIGH FIDELITY STEGANOGRAPHY

... According to DES Cryptographic Algorithm, for a 64-bit block of plaintext, initial permutation is carried out and the block are divided into a left half and right half of 32 bits long. Following that 16 rounds of ... See full document

4

Cryptography with chaos at the physical level

Cryptography with chaos at the physical level

... binary sequence (or any other discrete alphabet) into another binary sequence, which is then modulated and trans- mitted. In our proposed scheme, we transform the real y into another real value, and then modulate this ... See full document

5

Computer Based Diagnosis of Glaucoma using Digital Fundus Images

Computer Based Diagnosis of Glaucoma using Digital Fundus Images

... eye color image with database of images consisting of normal person as well as images of people suffering from ...The images’ having different color variations inside the eye is ... See full document

3

Visualization of the cell-free layer (CFL) in a PDMS microchannel with a micro-stenosis

Visualization of the cell-free layer (CFL) in a PDMS microchannel with a micro-stenosis

... twice with a physiological saline (PS) solution and diluted with Dx40 to make up the required RBC ...compliance with the Ethics Committee on Clinical Investigation of Tohoku ... See full document

6

DIGITAL WATERMARKING SCHEMES FOR AUTHORIZATION AGAINST COPYING OR PIRACY OF COLOR IMAGES

DIGITAL WATERMARKING SCHEMES FOR AUTHORIZATION AGAINST COPYING OR PIRACY OF COLOR IMAGES

... channel with the low- pass filter and the quickly changing parts are kept in the high-pass filter’s ...a multi-scale analysis can be used to the watermarking algorithm’s ... See full document

6

FUSION OF MULTI FOCUSED IMAGES USING HDWT FOR MACHINE VISION

FUSION OF MULTI FOCUSED IMAGES USING HDWT FOR MACHINE VISION

... Improved performance can be found using an over complete or redundant wavelet transform in variety of signal and image processing applications. For example, the Undecimated Discrete Wavelet Transform (UDWT), which is ... See full document

4

Modeling Soil Organic Carbon at Regional Scale by Combining Multi-Spectral Images with Laboratory Spectra.

Modeling Soil Organic Carbon at Regional Scale by Combining Multi-Spectral Images with Laboratory Spectra.

... RS images for soil spatial modeling indirectly extracts soil information from the vegeta- tion ...the pixel values of NDVI from June were ...samples with high SOC contents were underestimated in ... See full document

22

Automatic Orientation of Multi-Scale Terrestrial Images for 3D Reconstruction

Automatic Orientation of Multi-Scale Terrestrial Images for 3D Reconstruction

... processes with a large variety of applications that require ground control points (GCPs) in their ...satellite images on land-cover dynamics for biodiversity ...satellite images and also acquired ... See full document

21

A novel approach to segment skin lesions in dermoscopic images based on a deformable model

A novel approach to segment skin lesions in dermoscopic images based on a deformable model

... inwards with the speed function defined in (6) until it arrives at the position where either the lightness or the saturation is different from normal ...along with the curve evolution, this classification ... See full document

10

Optoelectronic Correlator Based on YUV Color Model with Multi-level Quantized Reference Function for Chromatic Image Recognition

Optoelectronic Correlator Based on YUV Color Model with Multi-level Quantized Reference Function for Chromatic Image Recognition

... YUV color model for chromatic pattern recognition. The multi-channel joint transform correlator requires a larger liquid crystal spatial light modulator (LCSLM) to achieve the chromatic pattern ...YUV ... See full document

4

Show all 10000 documents...