• Citations Per Year
Learn More
It’s well-known that visual secret sharing aims at encrypting a secret image into numerous meaningless sharing images by either designing a well-designed codebook or generating random bit sequence, and reconstructing the secret by superimposing them without any computation involved. However, the traditional visual secret sharing schemes only deal(More)
Recently, Chung et al. (2009) proposed a novel and valuable threshold authenticated encryption scheme. Unfortunately, it has a potential weakness: if the secret message involves criminal evidence or illegal content, the designated receiver cannot authenticate the secret message in the later dispute. The authors of this paper aim at enhancing Chung et al.’s(More)
Inside the current years with the development of internet technologies, video technology were widely used in television, conversation and multimedia, so protection is required on video statistics. although a good deal video encryption method has been develop however no longer provide so much performance in terms of encryption and decryption technique. a(More)
  • 1