Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
By reversing secret images, a novel multi-secret visual cryptography scheme is presented in this paper. During the secret sharing process, the correlative matrices are designed to encode multiple images into two ring shares. Compared with the previous ones, the proposed scheme makes the number of secret images not restricted and has obviously improved the pixel expansion and the relative difference.
Participants colluding is an important issue of cheater detectable visual cryptography schemes. Based on a trusty third party, a co-cheating prevention visual cryptography scheme (CCPVCS) is proposed in this paper. Checking efficiency is improved by verifying the truth of several shares simultaneously, with designed special verification shares. Since the scheme idea is different from previous ones,...
Based on correlative matrices set and random permutation, a new construction of rotation visual cryptography scheme (RVCS) has been presented, which can be used to encode four secret images into two shares. Experimental results demonstrate that four secrets can be recovered clearly by stacking two shares with different angles and the shapes of the reconstructed images do not have distortions.
To solve the problem of cheating in the reconstructing process of visual cryptography, a verifiable visual cryptography was proposed by adding a verifier to common visual cryptography scheme (VCS). This scheme can be used in any access structure and can check every share to prevent attackers from spoiling and grabbing the secret information.
A modified threshold visual cryptography scheme (k, l, n)-VCS is proposed, which is used to analyze the relationship between the pixel expansion and the range of the participants?? number. Based on (k, l, n)-VCS, a more precise definition of multi-secret sharing visual cryptography scheme is given, and a new method is presented. Experimental results demonstrate that both pixel expansion and relative...
Since there is eavesdropping and MITM attack during establishing encryption key between two Bluetooth devices, a secure key agreement scheme is designed based on elliptic curves cryptography and interlock protocol. This scheme can defend two kinds of attacks mentioned above. It provides bidirectional authentication for two devices and key integrity verification by exchanging the keyspsila Hash-value...
A new method of realizing fingerprint authentication on Smartcard has been presented. Based on SOC, this method puts the pre-processing algorithm, which is the most time-wasting process, out of card. It not only decreases the complexity of realizing fingerprint authentication on Smartcard, but also ensures the security of fingerprint information due to the original fingerprint image has been transformed...
Original VCS can only share a secret image at a time. When we want to share more secret images, we need to preserve a number of shares which increase our burden. Based on (k, n)-VCS and (k-1, k-1)-VCS, we propose a multi-secret sharing threshold VCS that a participant only preserves a share to share more than one secret and expands the scope of application.
Two parameters, pixel expansion and contrast, are very important in visual cryptography. It's very difficult to optimize both of them in theory. Based on combination, A (2, n) scheme, which existence has been proved theoretically, has been proposed in this paper. Meantime, the method of construct has been carried out. Simulation results demonstrate that this scheme can balance performance between...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.