En este documento se presenta un esquema de comunicación encubierta de imágenes en escala de grises ocultas en imágenes a color. El criterio principal en el diseño del esquema es la transparencia de la imagen encubierta, lo que significa que la imagen final (stego) es altamente similar a la imagen de color original, tanto a nivel visual como a nivel estadístico. Se realizan pruebas para medir la transparencia y la calidad de la imagen a escala de grises recuperada en el receptor. This manuscript shows a proposal of covert communication of grayscale images into color images. The main parameter taken into account in the design of the scheme is the transparency of the covert image; meaning that the covert image should be highly similar (perce...
Reversible color-to-grayscale conversion (RCGC) aims at embedding the chromatic information of a ful...
A new secret sharing scheme for color images is introduced. Using the {k,n}-secret sharing strategy ...
A secure image transmission method is presented, which transforms an input secret image into a secre...
This manuscript shows a proposal of covert communication of grayscale images into color images. The ...
La transparencia, la calidad y el tiempo de procesamiento son algunos de los parámetros más impo...
Abstract- With fast advance digital technology image processing is fastest and secure area of resear...
A new block embedding algorithm with a secret key is introduced for the Color-to-Gray and Back trans...
[[abstract]]In this paper, we present a steganographic method for embedding a color or a grayscale i...
A new secret sharing scheme suitable for encrypting color images is introduced. The scheme, which ca...
The Color to Gray and Back transformation watermarking with a secrete key is considered. Color is em...
Abstract-Digital image authentication is difficult for binary images because of its simple binary na...
[[abstract]]Visual cryptography, an emerging cryptography technology, uses the characteristics of hu...
Color Visual Secret Sharing (VSS) is an essential form of VSS. It is so because nowadays, most peopl...
En los sistemas de visión artificial es recurrente la conversión de la imagen a color en su correspo...
Abstract: Cryptography is the science of writing in secret code and is an ancient art. Cryptography ...
Reversible color-to-grayscale conversion (RCGC) aims at embedding the chromatic information of a ful...
A new secret sharing scheme for color images is introduced. Using the {k,n}-secret sharing strategy ...
A secure image transmission method is presented, which transforms an input secret image into a secre...
This manuscript shows a proposal of covert communication of grayscale images into color images. The ...
La transparencia, la calidad y el tiempo de procesamiento son algunos de los parámetros más impo...
Abstract- With fast advance digital technology image processing is fastest and secure area of resear...
A new block embedding algorithm with a secret key is introduced for the Color-to-Gray and Back trans...
[[abstract]]In this paper, we present a steganographic method for embedding a color or a grayscale i...
A new secret sharing scheme suitable for encrypting color images is introduced. The scheme, which ca...
The Color to Gray and Back transformation watermarking with a secrete key is considered. Color is em...
Abstract-Digital image authentication is difficult for binary images because of its simple binary na...
[[abstract]]Visual cryptography, an emerging cryptography technology, uses the characteristics of hu...
Color Visual Secret Sharing (VSS) is an essential form of VSS. It is so because nowadays, most peopl...
En los sistemas de visión artificial es recurrente la conversión de la imagen a color en su correspo...
Abstract: Cryptography is the science of writing in secret code and is an ancient art. Cryptography ...
Reversible color-to-grayscale conversion (RCGC) aims at embedding the chromatic information of a ful...
A new secret sharing scheme for color images is introduced. Using the {k,n}-secret sharing strategy ...
A secure image transmission method is presented, which transforms an input secret image into a secre...