2020
DOI: 10.1016/j.jvcir.2020.102911
|View full text |Cite
|
Sign up to set email alerts
|

(t, k, n) XOR-based visual cryptography scheme with essential shadows

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…Around all types of files could be included in the mainframe image Steganography, but images were proven to be the most complete aspect of the embedding due to their high level of joblessness. When we analyze, discuss, and extend steganography techniques, three considerations [13][14][15][16] must be considered: ➢ Capability: switch to the sum of data that can interleave to the swathe reflection, which was called payload for a moment [17]. ➢ Resilience: conflicts with various compressed image processing.…”
Section: Visual Cryptography and Methods Challengesmentioning
confidence: 99%
“…Around all types of files could be included in the mainframe image Steganography, but images were proven to be the most complete aspect of the embedding due to their high level of joblessness. When we analyze, discuss, and extend steganography techniques, three considerations [13][14][15][16] must be considered: ➢ Capability: switch to the sum of data that can interleave to the swathe reflection, which was called payload for a moment [17]. ➢ Resilience: conflicts with various compressed image processing.…”
Section: Visual Cryptography and Methods Challengesmentioning
confidence: 99%
“…However, the main drawback of GAS is memory complexity [56]. The ability to assign permission levels to shares have also been previously addressed in the weight-based scheme proposed in [109] and the (t, k, n) scheme in [58].…”
Section: Share Flexibilitymentioning
confidence: 99%
“…Network security has been growing on a larger scale [22]. It is used for accessing data with a secure platform where the admin rights are given with proper credentials.…”
Section: Online Voting System Using Visual Cryptography and Facementioning
confidence: 99%