The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Three dimensional (3-D) visual immersive system provides a better experience of virtual or remote environments compared with 2-D vision and is thus becoming one of the most active research fields of virtual reality. This paper describes how a 3-D multimode visual immersive system (3DMVIS) is developed, including system architecture, triplet lens module, head orientation tracking circuit, display module,...
This paper proposes a visual secret sharing scheme for color image encryption with robust and progressive decryption abilities. Robust decryption means the secret content can be still decrypted from shares even the shares are corrupted with intentional or unintentional alterations. In progressive decryption, three levels quality of secret images can be decrypted with the same shares. A lower visual...
This paper proposes a scheme to hide some extra confidential data in transparencies during secret image encryption in visual cryptography. The secret image is multitoned into several levels first. An extended non-expansion visual secret sharing model is employed, i.e. size of transparencies is equal to that of the secret image. Thus less time and space are needed for transparencies transmission and...
This paper proposes a scheme to hide some confidential data in image size invariant visual cryptography. The data hiding processing is synchronized with the secret image encryption. The basic property of the conventional visual cryptography is well maintained in our scheme. That is, the secret information can be decrypted by stacking the two transparencies. Besides, the hidden data can be accurately...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.