咨询与建议

限定检索结果

文献类型

  • 14 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 15 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 7 篇 计算机科学与技术...
    • 6 篇 网络空间安全
    • 4 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 信息与通信工程
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 理学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 工商管理

主题

  • 15 篇 visual cryptogra...
  • 2 篇 shares
  • 2 篇 security
  • 1 篇 secret sharing
  • 1 篇 ballots
  • 1 篇 time-stamp
  • 1 篇 visual secret sh...
  • 1 篇 secret image
  • 1 篇 elliptic curve c...
  • 1 篇 probabilistic vi...
  • 1 篇 image encryption
  • 1 篇 compound functio...
  • 1 篇 phishing
  • 1 篇 pixel
  • 1 篇 shoulder surfing
  • 1 篇 secret sharing s...
  • 1 篇 digital watermar...
  • 1 篇 authentication
  • 1 篇 visual secret sh...
  • 1 篇 graphical passwo...

机构

  • 1 篇 college of cyber...
  • 1 篇 institute of res...
  • 1 篇 with state key l...
  • 1 篇 department of co...
  • 1 篇 engineering rese...
  • 1 篇 xidian universit...
  • 1 篇 department of co...
  • 1 篇 jis college of e...
  • 1 篇 with the departm...
  • 1 篇 beijing electron...
  • 1 篇 college of compu...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 university of ch...
  • 1 篇 department of ap...
  • 1 篇 global institute...
  • 1 篇 school of inform...
  • 1 篇 faculty of infor...
  • 1 篇 computerscienced...

作者

  • 2 篇 feng liu
  • 1 篇 ahood alotaibi
  • 1 篇 naya nagy
  • 1 篇 2. chengdu insti...
  • 1 篇 lama alhubaidi
  • 1 篇 r.balakrishnan
  • 1 篇 ayman aaly
  • 1 篇 he wencai
  • 1 篇 youngchang hou
  • 1 篇 stephen michael ...
  • 1 篇 郑富国
  • 1 篇 leena marghalani
  • 1 篇 陈宗和
  • 1 篇 li jiliang
  • 1 篇 d.narasimhanand ...
  • 1 篇 dyuvaraj
  • 1 篇 yangyixian
  • 1 篇 wen wang
  • 1 篇 hu yupu
  • 1 篇 chih-cheng wu

语言

  • 15 篇 英文
检索条件"主题词=visual cryptography"
15 条 记 录,以下是1-10 订阅
排序:
Multi secret image color visual cryptography schemes for general access structures
收藏 引用
Progress in Natural Science:Materials International 2006年 第4期16卷 431-436页
作者: YI Feng, WANG Daoshun , LUO Ping, HUANG Liansheng and DAI Yiqi Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China [a]Department of Computer Science and Technology Tsinghua University Beijing China
In the proposed visual cryptography schemes for general access structures, the single secret image black-and-white visual cryptography schemes with meaningful shares have been constructed, in which the shares are inno... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Secret Image Communication Scheme Based on visual cryptography and Tetrolet Tiling Patterns
收藏 引用
Computers, Materials & Continua 2020年 第11期65卷 1283-1301页
作者: N.RajeshKumar DYuvaraj G.Manikandan R.BalaKrishnan B.Karthikeyan D.Narasimhanand N.R.Raajan Srinivasa Ramanujan Centre SASTRA Deemed UniversityKumbakonamTamil NaduIndia Department of Computer Science Cihan University-DuhokDuhokIraq School of Computing SASTRA Deemed UniversityThanjavurTamil NaduIndia School of EEE SASTRA Deemed UniversityThanjavurTamil NaduIndia
visual cryptographic scheme is specially designed for secret image sharing in the form of shadow *** basic idea of visual cryptography is to construct two or more secret shares from the original image in the form of c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Region Incrementing visual cryptography Scheme with Same Contrast
收藏 引用
Chinese Journal of Electronics 2016年 第4期25卷 621-624页
作者: LI Shundong LI Jiliang WANG Daoshun School of Computer Science Shaanxi Normal University Department of Computer Science and Technology Tsinghua University
In binary Region incrementing visual cryptography schemes(RIVCSs),the secrets of multiple secrecy regions can be gradually revealed by human visual system.A characteristic of the existing binary RIVCSs different from ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Usability and Security of Arabic Text-based CAPTCHA Using visual cryptography
收藏 引用
Computer Systems Science & Engineering 2022年 第2期40卷 421-440页
作者: Suliman A.Alsuhibany Meznah Alquraishi Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia
Recently,with the spread of online services involving websites,attack-ers have the opportunity to expose these services to malicious *** protect these services,A Completely Automated Public Turing Test to Tell Compute... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
RGB Based Multiple Share Creation in visual cryptography with Aid of Elliptic Curve cryptography
收藏 引用
China Communications 2017年 第2期14卷 118-130页
作者: K.Shankar P.Eswaran Department of Computer Science and Engineering Alagappa UniversityKaraikudi-630003Tamil NaduIndia Department of Computer Science and Engineering Alagappa UniversityKaraikudi-630003Tamil NaduIndia
In visual cryptography, many shares are generated which are illogical containing certain message within themselves. When all shares are piled jointly, they tend to expose the secret of the image. The notion of visual ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based visual cryptography
收藏 引用
Computers, Materials & Continua 2021年 第4期67卷 1207-1224页
作者: Pranati Rakshit Sreeparna Ganguly Souvik Pal Ayman AAly Dac-Nhuong Le JIS College of Engineering KalyaniWest Bengal741235India Global Institute of Management and Technology NadiaWest Bengal741102India Department of Mechanical Engineering College of EngineeringTaif UniversityTaif21944Saudi Arabia Institute of Research and Development Duy Tan UniversityDanang550000Vietnam Faculty of Information Technology Duy Tan UniversityDanang550000Vietnam
With the increasing need of sensitive or secret data transmission through public network,security demands using cryptography and steganography are becoming a thirsty research area of last few *** two techniques can be... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A DIGITAL SIGNATURE-BASED visual cryptography SCHEME FOR IMAGE DISCRIMINATION AND MANAGEMENT
收藏 引用
Journal of Electronics(China) 2009年 第5期26卷 631-636页
作者: Han Yanyan Hu Yupu He Wencai Engineering Research Center of Information Security Beijing Electronic Science and Technology Institute Beijing 100070 China Ministry of Education Key Laboratory of Computer Networks & Information Security Xidian University Xi'an 710071 China Department of Scientific Research Beijing Electronic Science and Technology Institute Beijing 100070 China
visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no informat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
MULTI-WATERMARKING SCHEME FOR GROUP USERS BASED ON visual cryptography
收藏 引用
Journal of Electronics(China) 2005年 第4期22卷 364-370页
作者: YuanZhonglan XiaGuangsheng WenQiaoyan YangYixian P.O.Box126 BeijingUniversityofPostsandTelecommunicationsBeijing100876China StateKeyLaboratoryofIntegratedServicesNetwork XidianUniversityXi'an710071China
All watermarks are shared into shadow images using VCS(visual cryptography Scheme). Only one specific shadow (as a new watermark) is embedded into the host signal and the other ones are distributed to every user in ea... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Preventing Phishing Attack on Voting System Using visual cryptography
收藏 引用
Journal of Computer and Communications 2022年 第10期10卷 149-161页
作者: Ahood Alotaibi Lama Alhubaidi Alghala Alyami Leena Marghalani Bashayer Alharbi Naya Nagy College of Cybersecurity and Digital Forensics Imam Abdulrahman Bin Faisal University Dammam Saudi Arabia College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University Dammam Saudi Arabia
Phishing is one of the most common social engineering attacks that users over the internet fall for. An example is voting systems, and because such systems should be accurate and error free, phishing prevention techni... 详细信息
来源: 维普期刊数据库 维普期刊数据库 博看期刊 评论
Web Application Authentication Using visual cryptography and Cued Clicked Point Recall-based Graphical Password
收藏 引用
Journal of Computer Science Research 2021年 第3期3卷 29-41页
作者: Mary Ogbuka Kenneth Stephen Michael Olujuwon Department of Computer Science Federal University of TechnologyMinnaNigeria Department of Cyber Security Science Federal University of TechnologyMinnaNigeria
Alphanumerical usernames and passwords are the most used computer authentication *** approach has been found to have a number of ***,for example,frequently choose passwords that are simple to *** the other side,if a p... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论