Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Usability and Security of Arabic Text-based CAPTCHA Using Visual Cryptography

    Suliman A. Alsuhibany*, Meznah Alquraishi

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 421-440, 2022, DOI:10.32604/csse.2022.018929

    Abstract Recently, with the spread of online services involving websites, attackers have the opportunity to expose these services to malicious actions. To protect these services, A Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) is a proposed technique. Since many Arabic countries have developed their online services in Arabic, Arabic text-based CAPTCHA has been introduced to improve the usability for their users. Moreover, there exist a visual cryptography (VC) technique which can be exploited in order to enhance the security of text-based CAPTCHA by encrypting a CAPTCHA image into two shares and decrypting it by asking the… More >

  • Open Access

    ARTICLE

    Video Identification Based on Watermarking Schemes and Visual Cryptography

    Maged Wafy1,2,*, Samr Gamal Zanaty1,3, Mahmoud Elkhouly1

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 441-453, 2022, DOI:10.32604/csse.2022.018597

    Abstract Related to the growth of data sharing on the Internet and the wide - spread use of digital media, multimedia security and copyright protection have become of broad interest. Visual cryptography () is a method of sharing a secret image between a group of participants, where certain groups of participants are defined as qualified and may combine their share of the image to obtain the original, and certain other groups are defined as prohibited, and even if they combine knowledge of their parts, they can’t obtain any information on the secret image. The visual cryptography is one of the techniques… More >

  • Open Access

    ARTICLE

    Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography

    Pranati Rakshit1, Sreeparna Ganguly1, Souvik Pal2, Ayman A. Aly3, Dac-Nhuong Le4,5,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1207-1224, 2021, DOI:10.32604/cmc.2021.014293

    Abstract With the increasing need of sensitive or secret data transmission through public network, security demands using cryptography and steganography are becoming a thirsty research area of last few years. These two techniques can be merged and provide better security which is nowadays extremely required. The proposed system provides a novel method of information security using the techniques of audio steganography combined with visual cryptography. In this system, we take a secret image and divide it into several subparts to make more than one incomprehensible sub-images using the method of visual cryptography. Each of the sub-images is then hidden within individual… More >

  • Open Access

    ARTICLE

    Watermark Embedding for Direct Binary Searched Halftone Images by Adopting Visual Cryptography

    Yangyang Wang1, Rongrong Ni1,*, Yao Zhao1, Min Xian2

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 255-265, 2018, DOI:10.3970/cmc.2018.01732

    Abstract In this paper, two methods are proposed to embed visual watermark into direct binary search (DBS) halftone images, which are called Adjusted Direct Binary Search (ADBS) and Dual Adjusted Direct Binary Search (DADBS). DADBS is an improved version of ADBS. By using the proposed methods, the visual watermark will be embedded into two halftone images separately, thus, the watermark can be revealed when these two halftone images are overlaid. Experimental results show that both methods can achieve excellent image visual quality and decoded visual patterns. More >

Displaying 1-10 on page 1 of 4. Per Page