Visual Cryptography on mobile devices

Rungjie Wang, Gabriela Mogos*

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

Abstract

Visual cryptography helps to share secrets and uses the human eye to perform computation. This paper focuses on image transmission technology under visual cryptography technology. Experiments have shown that on a mobile device,
using recursive visual cryptography technology, an image can be successfully protected, and the perceptual hash algorithm can be used to detect if any malicious manipulation of the image has occurred during its transmission.
Original languageEnglish
Title of host publicationProceedings of CICET 2021 The International Conference on Recent Advancements in Computing in AI, IoT and Computer Engineering Technology
Publication statusPublished - 2021

Fingerprint

Dive into the research topics of 'Visual Cryptography on mobile devices'. Together they form a unique fingerprint.

Cite this