Articles with "visual secret" as a keyword



Photo from archive.org

On the security of threshold random grid-based visual secret sharing

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6478-3

Abstract: Visual secret sharing (VSS) technology encodes a secret image into some share images for sharing some classified information. Only when the participants gather and stack their share pictures the secret image would be reconstructed and… read more here.

Keywords: security threshold; visual secret; random grid; secret sharing ... See more keywords
Photo by arnosenoner from unsplash

XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-08351-0

Abstract: Quick response (QR) codes are becoming increasingly popular in various areas of life due to the advantages of the error correction capacity, the ability to be scanned quickly and the capacity to contain meaningful content.… read more here.

Keywords: image; visual secret; secret image; meaningful shadows ... See more keywords
Photo by cdr6934 from unsplash

Rich QR code with three-layer information using visual secret sharing scheme

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-7333-x

Abstract: Owing to efficient machine recognition, QR codes have been widely used in many aspects such as information management, electronic identity and mobile payment. Any QR code reader has access to the message contained in a… read more here.

Keywords: information; visual secret; code; layer ... See more keywords
Photo by lucabravo from unsplash

Color Visual Secret Sharing for QR Code with Perfect Module Reconstruction

Sign Up to like & get
recommendations!
Published in 2019 at "Applied Sciences"

DOI: 10.3390/app9214670

Abstract: Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc. Recently, researches have indicated that… read more here.

Keywords: visual secret; response code; code; secret sharing ... See more keywords