ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: Visual cryptography
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography
Abstract: When an image is created by multiple authors, it is reasonable that no single author monopolize the ow nership. The
#Joint ownership protection
# visual cryptography
# di screte cosine transform
Progressive Visual Cryptography with Friendly and Size Invariant Shares
like shares. As long as there are over k shares stacked out of n shares, the secret image can be directly decoded by the human
#Visual cryptography
# progressive visual cryptography
# secret sharing
# unexpanded share
# meaningful (Friendly) share
A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography
Abstract: When an image is created by multiple authors, it is reasonable that no single author monopolize the ow nership. The
#Joint ownership protection
# visual cryptography
# di screte cosine transform
#Digital signature
# non-expansion visual cryptography
# boolean operation
# visual share
New Fool Proof Examination System through Color Visual Cryptography and Signature Authentication
Mohamed Fathimal1 and Arockia Jansirani2 1Department of Computer Science and Engineering, SRM Institute of Science and Technology, India 2Department of Computer Science and Engineering, Manonmaniam Sundaranar University, India
#Visual cryptography
# secret sharing scheme
# examination system
# information security
# authentication
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint