Last edited by Kigalmaran
Thursday, July 23, 2020 | History

2 edition of Multi-secret Semantic Visual Cryptographic Protocol for Securing Image Communications found in the catalog.

Multi-secret Semantic Visual Cryptographic Protocol for Securing Image Communications

Multi-secret Semantic Visual Cryptographic Protocol for Securing Image Communications

ICCS 2014

  • 288 Want to read
  • 15 Currently reading

Published by Association of Scientists, Developers and Faculties in Bangkok, Thailand .
Written in English


About the Edition

Visual Cryptography is one of the ways, to share the visual secret information securely. Visual Cryptography Scheme (VCS) is an encryption method which provides information security that uses combinatorial techniques to encode secret written materials, without any complex cryptographic algorithms. We propose a new Multi-secret based Semantic Visual Cryptographic Protocol (MSVCP) that can encode the two secret images into the shares using error reduction. The implementation part begins with converting a grayscale image into a semantic image through error reduction, followed by embedding semantic image into n shares. Finally, secret image will reconstruct without showing any interference with the share images. The proposed a novel scheme called a MSVCP, which can be applied to grayscale images. The experimental result shows the effectiveness and advantages of the proposed MSVCP and it ensures the security and quality of the reconstructed secret images.

The Physical Object
FormatHardcopy
Number of Pages309
ID Numbers
Open LibraryOL25619996M
ISBN 108192523354
ISBN 109788192523354

ICCGI , The Fifteenth International Multi-Conference on Computing in the Global Information Technology; ICWMC , The Sixteenth International Conference on Wireless and Mobile Communications; VEHICULAR , The Ninth International Conference on Advances in Vehicular Systems, Technologies and ?view=instance&instance=SECURWARE+ Systems for secure cloud-based collaboration over shared objects. Embodiments operate within systems in a cloud-based environment, wherein one or more servers are configured to interface with storage devices that store objects accessible by one or more users. A process receives an electronic message comprising a user request to access an ://

The book includes research that spans a wide range of communication and networking technologies, including wireless sensor networks, big data, Internet of Things, optical and telecommunication networks, artificial intelligence, cryptography, next-generation networks,  › Engineering › Signals & Communication.   But this protocol can only work in the context that two mobile devices are in the coverage of mobile core network entities (e.g., BSs). It cannot support group D2D communications. Hsu et al. introduced an authenticated key exchange protocol for D2D communications in both network-absent and network-covered scenarios. It achieves end-to-end

This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing. Such solutions will be presented in an algorithmic form, aimed at solving the tasks of   Broadcast is used in wireless sensor networks for operations such as software updates, network queries, and command dissemination. Applications such as battlefield control and natural resource management require not only authentication of broadcast messages, but also secrecy against eavesdroppers. In this paper we design, implement, and evaluate a novel scheme that meets the


Share this book
You might also like
The law of stamp duties

The law of stamp duties

Atomic physics at Queens

Atomic physics at Queens

Dorothy Forster

Dorothy Forster

My picture atlas

My picture atlas

orientalists, painter-travellers

orientalists, painter-travellers

OPERATIONS MANAGEMENT, Revised Custom Edition For Oregon State University, BA 357

OPERATIONS MANAGEMENT, Revised Custom Edition For Oregon State University, BA 357

Kasper wing

Kasper wing

The Great brain

The Great brain

Nominations of Marvin B. Durning and David Hawkins

Nominations of Marvin B. Durning and David Hawkins

Employment reporting

Employment reporting

Observers book of heraldry

Observers book of heraldry

Clinical psychiatry

Clinical psychiatry

Your food and you.

Your food and you.

Multi-secret Semantic Visual Cryptographic Protocol for Securing Image Communications Download PDF EPUB FB2

Abstract-Visual Cryptography is one of the ways, to share the visual secret information securely. Visual Cryptography Scheme (VCS) is an encryption method which provides information security that uses combinatorial techniques to encode secret written Download Citation | Multi-secret Semantic Visual Cryptographic Protocol for Securing Image Communications | Visual Cryptography is one of the ways, to share the visual secret information ://   John Blesswin A, Visalakshi P, Sivakumar R, Karnan M, Jaganathan S C B and Bose C Multi-secret semantic visual cryptographic protocol (MSVCP) for securing image communications Asian J.

Inf. Technol. 13 – Crossref Google Scholar Multi-secret Semantic Visual Cryptographic Protocol for Securing Image Communications Most VCSs only share one secret image. A (k, n, s) multi-secret VCS (MVCS) is a (k, n)-VCS, which can Multi-secret semantic visual cryptographic protocol (MSVCP) for securing image communications January Asian Journal of Information Technology A.

John Blesswin Multi-secret Semantic Visual Cryptographic Protocol for Securing Image Communications We propose a new Multi-secret based Semantic Visual Cryptographic To obtain the secret image the R. Sivakumar's 14 research works with citations and 1, reads, including: A new Semantic Visual Cryptographic Protocol (SVCP) for securing multimedia communications John Blesswin A, Visalakshi P, Sivakumar R, Karnan M, Subash J, Bose C () Multi-secret semantic visual cryptographic protocol for securing image communications Google Scholar Lin SJ, Chen SK, Lin JC () Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and The protocol uses a cryptographic signature, (usually HMAC-SHA1) value that combines the token secret, nonce, and other request based information.

The great advantage of OAuth 1 is you never directly pass the token secret across the wire, which completely eliminates the possibility of anyone seeing a password in ://   Research. Research Interests Cryptography, Communication networks and security, Biometrics and authentication, Security and reliability for Grid/Cloud/Fog Computing, Security in wireless, delay tolerant, and mobile networks, Secret sharing, Health and personal genomic security and privacy, Design & analysis of algorithms, Image and data ://   Aims & Scope International Journal of Sensors, Wireless Communications and Control publishes timely research articles, reviews and communications on these three strongly related areas, with emphasis on networked control systems whose sensors are interconnected via wireless communication networks.

The emergence of high speed wireless network technologies allows a Yuxin Chen, Hariprasad Sampathkumar, Bo Luo, and Xue-wen Chen. iLike: Bridging the semantic gap in vertical image search by integrating text and visual features.

In IEEE Transactions on Knowledge and Data Engineering, is pp.~bluo/ Kumar et al. proposed a cryptographic model for securing image. Pixels of a channel were XOR-ed with pixels of other channel with sub-keys.

The total computation overhead was significantly reduced by avoiding the same computation. Chaotic encryption. As we enter the new social, physical and cyber world empowered by such intelligent ://   Cloud computing is an emerging, revenue generating and internet based technology, where computing power, storage and other resources are provided to the stakeholders in a single package.

The traditional online banking systems can make use of the cloud framework for providing economical and high-speed online service to the consumers.

This paper first describes a systematic Multi-factor bio This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDSheld in Trivandrum, India, in March The 32 revised full papers presented together with 9 short papers and 8 workshop papers were carefully reviewed and selected from :// Bibliographic content of IEEE Transactions on Information Forensics and Security, Volume 8 Cryptography (or cryptology; from Greek κρυπτός, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively) [1] is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).

[2] More generally, it is about constructing and analyzing protocols that overcome the influence of   Abstract. In this paper will be described new idea of security procedures using visual captcha, and dedicated to authentication procedures.

In particular will be presented the most important aspects connected with security of visual captcha used in security procedures, implemented in service management solutions in Cloud ://   We show how to efficiently construct a pseudorandom invertible permutation generator from a pseudorandom function generator.

Goldreich, Goldwasser and Micali [“How to construct random functions,” Proc. 25th Annual Symposium on Foundations of Computer Science, October 24–26, ] introduce the notion of a pseudorandom function generator and show how to efficiently construct a Shin S and Jung K () Reversible secret image sharing scheme in encrypted images, Multimedia Tools and Applications,(), Online publication date: 1-Nov Raja Sekhar K, Ravi Chandra T, Pooja S and Tapaswi S () Light weight security protocol for communications in vehicular networks, Wireless Networks,(.

Xinyuan Wang, Ruishan Zhang, in Advances in Computers, Secure Real-Time Transport Protocol. The secure real-time transport protocol (SRTP) [12] is an extension to RTP which provide confidentiality, message integrity, and replay protection to the RTP and RTCP traffic.

Except the SRTCP integrity protection, which is mandatory, these three security protections are optional and USB2 US14/, USA USB2 US B2 US B2 US B2 US A US A US A US B2 US B2 US B2 Authority US United States Prior art keywords block root fork payload hash Prior art date Legal status (The legal status is an assumption and is not a legal ://USA1 US14/, USA USA1 US A1 US A1 US A1 US A US A US A US A1 US A1 US A1 Authority US United States Prior art keywords root fork block payload hash Prior art date Legal status (The legal status is an assumption