In visual cryptography the additive property of light is used. Also the shares are random and therefore suspect to a censor. In this paper we present two new cryptographic schemes which use music and the wave properties of light. Both schemes are also secret sharing schemes in which shares are music or images and are not suspect to a human censor. Our scheme guarantees perfect privacy as well as high quality. To decrypt the message, one just plays two shares on a stereo system. There are two decryption methods which are either based on the interference property of sound or based on the stereo perception of the human hearing system. In optical cryptography, we use pictures as covers and the wave interference property of light. The privacy is...
Information security is very important in many application areas in the field of information technol...
Abstract - Secret Sharing is a cryptography algorithm. This technique divides secret data into multi...
In the recent trend of network and technology, “Cryptography” and “Steganography” have emerged out a...
A novel approach for enciphering digital audio signal is presented in this article. The operating pr...
Visual cryptography, introduced by Naor-Shamir at Eurocrypt '94, only requires primitive technology ...
Encryption, the process of data hiding at the time of transmission, gives security to messages. Audi...
Abstract-- Steganography is the art and science of hiding secret data to provide a safe communicatio...
This work examines the visual cryptography, which was introduced in 1995 by Moni Naor and Adi Shamir...
Abstract-The paper proposes a work on color extended optical cryptography using random shares, havi...
A position-multiplexing technique with ultra-broadband illumination is proposed to enhance the infor...
Data hiding, a form of steganography, is one of the emerging techniques that embeds secret data into...
This paper proposes a high-fidelity decryption technology for secret images based on Visual Cryptogr...
Internet hacking has become common now a days and is increasing day by day. It is a high time to saf...
Steganography is a part of hiding information in a host signal. The goal of steganographic systems i...
We analyze optical encryption systems using the techniques of conventional cryptography. All convent...
Information security is very important in many application areas in the field of information technol...
Abstract - Secret Sharing is a cryptography algorithm. This technique divides secret data into multi...
In the recent trend of network and technology, “Cryptography” and “Steganography” have emerged out a...
A novel approach for enciphering digital audio signal is presented in this article. The operating pr...
Visual cryptography, introduced by Naor-Shamir at Eurocrypt '94, only requires primitive technology ...
Encryption, the process of data hiding at the time of transmission, gives security to messages. Audi...
Abstract-- Steganography is the art and science of hiding secret data to provide a safe communicatio...
This work examines the visual cryptography, which was introduced in 1995 by Moni Naor and Adi Shamir...
Abstract-The paper proposes a work on color extended optical cryptography using random shares, havi...
A position-multiplexing technique with ultra-broadband illumination is proposed to enhance the infor...
Data hiding, a form of steganography, is one of the emerging techniques that embeds secret data into...
This paper proposes a high-fidelity decryption technology for secret images based on Visual Cryptogr...
Internet hacking has become common now a days and is increasing day by day. It is a high time to saf...
Steganography is a part of hiding information in a host signal. The goal of steganographic systems i...
We analyze optical encryption systems using the techniques of conventional cryptography. All convent...
Information security is very important in many application areas in the field of information technol...
Abstract - Secret Sharing is a cryptography algorithm. This technique divides secret data into multi...
In the recent trend of network and technology, “Cryptography” and “Steganography” have emerged out a...