咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13 篇 工学
    • 9 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 机械工程
    • 4 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
    • 2 篇 力学(可授工学、理...
    • 2 篇 信息与通信工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
    • 1 篇 控制科学与工程
  • 6 篇 理学
    • 4 篇 数学
    • 1 篇 物理学
    • 1 篇 系统科学
  • 2 篇 军事学
    • 2 篇 军队指挥学

主题

  • 14 篇 visual cryptogra...
  • 2 篇 secret sharing
  • 2 篇 shares
  • 2 篇 security
  • 1 篇 m4 matrix
  • 1 篇 visual secret sh...
  • 1 篇 elliptic curve c...
  • 1 篇 image encryption
  • 1 篇 phishing
  • 1 篇 pixel
  • 1 篇 linear programmi...
  • 1 篇 remote voting sy...
  • 1 篇 audio steganogra...
  • 1 篇 security defect
  • 1 篇 variance
  • 1 篇 psnr
  • 1 篇 captcha
  • 1 篇 mean square erro...
  • 1 篇 threshold scheme...
  • 1 篇 key-logging

机构

  • 1 篇 faculty of infor...
  • 1 篇 with state key l...
  • 1 篇 department of co...
  • 1 篇 with the departm...
  • 1 篇 department of co...
  • 1 篇 jis college of e...
  • 1 篇 university of ch...
  • 1 篇 department of co...
  • 1 篇 srinivasa ramanu...
  • 1 篇 school of inform...
  • 1 篇 department of co...
  • 1 篇 graduate institu...
  • 1 篇 department of me...
  • 1 篇 college of cyber...
  • 1 篇 department of cy...
  • 1 篇 school of comput...
  • 1 篇 global institute...
  • 1 篇 institute of res...
  • 1 篇 department of co...
  • 1 篇 school of comput...

作者

  • 2 篇 feng liu
  • 1 篇 lama alhubaidi
  • 1 篇 ayman aaly
  • 1 篇 youngchang hou
  • 1 篇 li jiliang
  • 1 篇 dyuvaraj
  • 1 篇 wen wang
  • 1 篇 bashayer alharbi
  • 1 篇 meznah alquraish...
  • 1 篇 yi feng wang dao...
  • 1 篇 dac-nhuong le
  • 1 篇 g.manikandan
  • 1 篇 ganzhi chenkefei
  • 1 篇 b.karthikeyan
  • 1 篇 n.rajeshkumar
  • 1 篇 pranati rakshit
  • 1 篇 teng guo
  • 1 篇 p.eswaran
  • 1 篇 ahood alotaibi
  • 1 篇 naya nagy

语言

  • 14 篇 英文
检索条件"主题词=visual cryptography"
14 条 记 录,以下是1-10 订阅
排序:
Usability and Security of Arabic Text-based CAPTCHA Using visual cryptography
收藏 引用
Computer Systems Science & Engineering 2022年 第2期40卷 421-440页
作者: Suliman A.Alsuhibany Meznah Alquraishi Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia
Recently,with the spread of online services involving websites,attack-ers have the opportunity to expose these services to malicious *** protect these services,A Completely Automated Public Turing Test to Tell Compute... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Region Incrementing visual cryptography Scheme with Same Contrast
收藏 引用
Chinese Journal of Electronics 2016年 第4期25卷 621-624页
作者: LI Shundong LI Jiliang WANG Daoshun School of Computer Science Shaanxi Normal University Department of Computer Science and Technology Tsinghua University
In binary Region incrementing visual cryptography schemes(RIVCSs),the secrets of multiple secrecy regions can be gradually revealed by human visual system.A characteristic of the existing binary RIVCSs different from ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Multi secret image color visual cryptography schemes for general access structures
收藏 引用
Progress in Natural Science:Materials International 2006年 第4期16卷 431-436页
作者: YI Feng, WANG Daoshun , LUO Ping, HUANG Liansheng and DAI Yiqi Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
In the proposed visual cryptography schemes for general access structures, the single secret image black-and-white visual cryptography schemes with meaningful shares have been constructed, in which the shares are inno... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Secret Image Communication Scheme Based on visual cryptography and Tetrolet Tiling Patterns
收藏 引用
Computers, Materials & Continua 2020年 第11期65卷 1283-1301页
作者: N.RajeshKumar DYuvaraj G.Manikandan R.BalaKrishnan B.Karthikeyan D.Narasimhanand N.R.Raajan Srinivasa Ramanujan Centre SASTRA Deemed UniversityKumbakonamTamil NaduIndia Department of Computer Science Cihan University-DuhokDuhokIraq School of Computing SASTRA Deemed UniversityThanjavurTamil NaduIndia School of EEE SASTRA Deemed UniversityThanjavurTamil NaduIndia
visual cryptographic scheme is specially designed for secret image sharing in the form of shadow *** basic idea of visual cryptography is to construct two or more secret shares from the original image in the form of c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
RGB Based Multiple Share Creation in visual cryptography with Aid of Elliptic Curve cryptography
收藏 引用
China Communications 2017年 第2期14卷 118-130页
作者: K.Shankar P.Eswaran Department of Computer Science and Engineering Alagappa UniversityKaraikudi-630003Tamil NaduIndia Department of Computer Science and Engineering Alagappa UniversityKaraikudi-630003Tamil NaduIndia
In visual cryptography, many shares are generated which are illogical containing certain message within themselves. When all shares are piled jointly, they tend to expose the secret of the image. The notion of visual ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based visual cryptography
收藏 引用
Computers, Materials & Continua 2021年 第4期67卷 1207-1224页
作者: Pranati Rakshit Sreeparna Ganguly Souvik Pal Ayman AAly Dac-Nhuong Le JIS College of Engineering KalyaniWest Bengal741235India Global Institute of Management and Technology NadiaWest Bengal741102India Department of Mechanical Engineering College of EngineeringTaif UniversityTaif21944Saudi Arabia Institute of Research and Development Duy Tan UniversityDanang550000Vietnam Faculty of Information Technology Duy Tan UniversityDanang550000Vietnam
With the increasing need of sensitive or secret data transmission through public network,security demands using cryptography and steganography are becoming a thirsty research area of last few *** two techniques can be... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Preventing Phishing Attack on Voting System Using visual cryptography
收藏 引用
Journal of Computer and Communications 2022年 第10期10卷 149-161页
作者: Ahood Alotaibi Lama Alhubaidi Alghala Alyami Leena Marghalani Bashayer Alharbi Naya Nagy College of Cybersecurity and Digital Forensics Imam Abdulrahman Bin Faisal University Dammam Saudi Arabia College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University Dammam Saudi Arabia
Phishing is one of the most common social engineering attacks that users over the internet fall for. An example is voting systems, and because such systems should be accurate and error free, phishing prevention techni... 详细信息
来源: 维普期刊数据库 维普期刊数据库 博看期刊 评论
Web Application Authentication Using visual cryptography and Cued Clicked Point Recall-based Graphical Password
收藏 引用
Journal of Computer Science Research 2021年 第3期3卷 29-41页
作者: Mary Ogbuka Kenneth Stephen Michael Olujuwon Department of Computer Science Federal University of TechnologyMinnaNigeria Department of Cyber Security Science Federal University of TechnologyMinnaNigeria
Alphanumerical usernames and passwords are the most used computer authentication *** approach has been found to have a number of ***,for example,frequently choose passwords that are simple to *** the other side,if a p... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Construction of General (k, n) Probabilistic visual cryptography Scheme
收藏 引用
Journal of Electronic Science and Technology 2011年 第4期9卷 317-324页
作者: Ching-Nung Yang Chih-Cheng Wu Feng Liu with the Department of Computer Science and Information Engineering National Dong Hwa University with State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences.
visual cryptography scheme (VCS) is a secure method that encrypts a secret image by subdividing it into shadow images. Due to the nature of encryption VCS is categorized into two types: the deterministic VCS (DVCS... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Shift visual cryptography scheme of two secret images
收藏 引用
Progress in Natural Science:Materials International 2003年 第6期 59-65页
作者: WANG Daoshun , LUO Ping, YANG Lu, QI Dongxu and DAI Yiqi (1. Department of Computer Science and Technology, Tsmghua University, Beijing 100084, China 2. Chengdu Institute of Computer Applications, Chinese Academy of Sciences, Chengdu 610041, China 3. School of Information Science and Technology, Zhongshan U-niversity, Guangzhou 510275, China)
A new visual cryptography scheme of two secret images, which is named the shift visual cryptography of two secret images, is given. The compound function family of a general construction model is also introduced. The ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论