EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Visual Cryptography"
Narrow search

Narrow search

Year of publication
Subject
All
Visual Cryptography 10 Pixel Expansion 3 Cloud Computing 2 Data security 2 Datensicherheit 2 Meaningful Share 2 Visual Secret Sharing 2 Visualisierung 2 Visualization 2 visual cryptography 2 Authentication 1 Basic Matrix 1 Big Data 1 Big data 1 Biometrics 1 Braille 1 Captcha 1 Cloud computing 1 Compartmented Secret Sharing 1 Data Confidentiality 1 Data Mining 1 Data mining 1 Data processing 1 Data protection 1 Datenschutz 1 Datenverarbeitung 1 Digital Secret Sharing 1 Dynamic Secret Sharing 1 Error Correction 1 Exclusive 1 Extended Visual Cryptography Scheme 1 Facial Signature Recognition 1 General Access Structure 1 Graph Access Structure 1 Homomorphic Encryption 1 Homomorphic Visual Cryptography 1 Human Visual System 1 IT crime 1 IT-Kriminalität 1 Image Encryption 1
more ... less ...
Online availability
All
Undetermined 14
Type of publication
All
Article 14
Type of publication (narrower categories)
All
Article in journal 2 Aufsatz in Zeitschrift 2
Language
All
English 14
Author
All
Liu, Lintao 3 Lu, Yuliang 3 Yan, Xuehu 3 Liu, Feng 2 Wan, Song 2 Agrawal, Nitesh Kumar 1 Brindha, K. 1 Das, Manik Lal 1 Ding, Wanmeng 1 Fathimal, P. Mohamed 1 Guo, Teng 1 Haldar, Manas Kumar 1 Issac, Biju 1 Jeyanthi, N. 1 Jiao, Jian 1 Khare, Ayush 1 Liu, Hanlin 1 Liu, Xin 1 Ma, Duohe 1 Madala, Srinivasa Rao 1 Mohan, Mamtha 1 Pal, Arup Kumar 1 Pandey, Dhiraj 1 Rajavarman, V. N. 1 Rani, P. Arockia Jansi 1 Rawat, U. S. 1 Rura, Lauretha 1 Sang, Jianzhi 1 Saranjame, Rahul 1 Sharma, Rahul 1 Sujatha, B. K. 1 Vivek, T. Venkata Satya 1 Wang, Guangyu 1 Wang, Shen 1 Wang, Wen 1 Yan, Wei Qi 1 Zhang, Weizhe 1
more ... less ...
Published in...
All
International Journal of Digital Crime and Forensics (IJDCF) 6 International Journal of Biomedical and Clinical Engineering (IJBCE) 1 International Journal of Business Data Communications and Networking (IJBDCN) 1 International Journal of Computer Vision and Image Processing (IJCVIP) 1 International Journal of Electronic Government Research (IJEGR) 1 International Journal of Information Security and Privacy (IJISP) 1 International Journal of Rough Sets and Data Analysis (IJRSDA) 1 International journal of intelligent enterprise 1 International journal of services technology and management : IJSTM 1
more ... less ...
Source
All
Other ZBW resources 12 ECONIS (ZBW) 2
Showing 1 - 10 of 14
Cover Image
Exploiting the Homomorphic Property of Visual Cryptography
Yan, Xuehu; Lu, Yuliang; Liu, Lintao; Wan, Song; Ding, … - In: International Journal of Digital Crime and Forensics (IJDCF) 9 (2017) 2, pp. 45-56
In this paper, homomorphic visual cryptographic scheme (HVCS) is proposed. The proposed HVCS inherits the good features of traditional VCS, such as, loss-tolerant (e.g., (k, n) threshold) and simply reconstructed method, where simply reconstructed method means that the decryption of the secret...
Persistent link: https://www.econbiz.de/10012043943
Saved in:
Cover Image
An Improved Size Invariant (n, n) Extended Visual Cryptography Scheme
Sharma, Rahul; Agrawal, Nitesh Kumar; Khare, Ayush; … - In: International Journal of Business Data Communications … 12 (2016) 2, pp. 80-88
In this paper, the authors have presented a (n, n) extended visual cryptography scheme where n numbers of meaningful …) extended visual cryptography scheme. …
Persistent link: https://www.econbiz.de/10012043264
Saved in:
Cover Image
Chaotic Map for Securing Digital Content: A Progressive Visual Cryptography Approach
Pandey, Dhiraj; Rawat, U. S. - In: International Journal of Rough Sets and Data Analysis … 3 (2016) 1, pp. 20-35
Progressive Visual Cryptography (PVC) is quite suitable for sharing sensitive digital data.Previous research on PVC …
Persistent link: https://www.econbiz.de/10012047345
Saved in:
Cover Image
Advanced graphical-based security approach to handle hard AI problems based on visual security
Vivek, T. Venkata Satya; Rajavarman, V. N.; Madala, … - In: International journal of intelligent enterprise 7 (2020) 1/2/3, pp. 250-266
Persistent link: https://www.econbiz.de/10012177420
Saved in:
Cover Image
SDPBDVC : secure data processing on big data using visual cryptography
Brindha, K.; Jeyanthi, N. - In: International journal of services technology and … 26 (2020) 2/3, pp. 237-251
Persistent link: https://www.econbiz.de/10012503570
Saved in:
Cover Image
Securing Digital Image from Malicious Insider Attacks
Saranjame, Rahul; Das, Manik Lal - In: International Journal of Computer Vision and Image … 8 (2018) 2, pp. 49-58
Protection of digital images from malicious (and dishonest) insider entities is an important concern in modern digital space. A malicious entity can alter some important features of an image to mislead the target recipient of the image, which can cause harm in applications such as healthcare,...
Persistent link: https://www.econbiz.de/10012043851
Saved in:
Cover Image
Image Secret Sharing Construction for General Access Structure with Meaningful Share
Yan, Xuehu; Lu, Yuliang; Liu, Lintao; Ma, Duohe - In: International Journal of Digital Crime and Forensics (IJDCF) 10 (2018) 3, pp. 66-77
This article describes how the (k, n) threshold image secret sharing technology can recover the secret image even n − k shares are lost, or n−k servers do not work, which is useful for cloud storage, etc. Image secret sharing for general access structure (GAS) is more general than (k, n)...
Persistent link: https://www.econbiz.de/10012043977
Saved in:
Cover Image
A Tenable Approach for Protection of Electronic Medical Records Using Thermal Image Watermarking
Mohan, Mamtha; Sujatha, B. K. - In: International Journal of Biomedical and Clinical … 6 (2017) 2, pp. 46-61
using watermarking and Visual Cryptography (VC). The proposed scheme offers a complete protection framework for the facial …
Persistent link: https://www.econbiz.de/10012043234
Saved in:
Cover Image
On the Pixel Expansion of Visual Cryptography Scheme
Liu, Feng; Guo, Teng; Jiao, Jian; Wang, Wen - In: International Journal of Digital Crime and Forensics (IJDCF) 9 (2017) 2, pp. 38-44
In this paper, we first follow Ateniese et al.'s work that provides upper bounds of the pixel expansion of visual … cryptography schemes(VCSs) for more kinds of graph access structures, in which we require that a subset of parties can determine …
Persistent link: https://www.econbiz.de/10012043942
Saved in:
Cover Image
A Novel Pixel Merging-Based Lossless Recovery Algorithm for Basic Matrix VSS
Zhang, Weizhe; Liu, Xin; Wang, Shen; Sang, Jianzhi - In: International Journal of Digital Crime and Forensics (IJDCF) 9 (2017) 3, pp. 1-10
Lossless recovery in visual secret share (VSS) is very meaningful. In this paper, a novel lossless recovery algorithm for the basic matrix VSS is proposed. The secret image is reconstructed losslessly by using simple exclusive XOR operation and merging pixel. The algorithm not only can apply to...
Persistent link: https://www.econbiz.de/10012043944
Saved in:
  • 1
  • 2
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...