Abstract
Visual cryptography helps to share secrets and uses the human eye to perform computation. This paper focuses on image transmission technology under visual cryptography technology. Experiments have shown that on a mobile device,
using recursive visual cryptography technology, an image can be successfully protected, and the perceptual hash algorithm can be used to detect if any malicious manipulation of the image has occurred during its transmission.
using recursive visual cryptography technology, an image can be successfully protected, and the perceptual hash algorithm can be used to detect if any malicious manipulation of the image has occurred during its transmission.
Original language | English |
---|---|
Title of host publication | Proceedings of CICET 2021 The International Conference on Recent Advancements in Computing in AI, IoT and Computer Engineering Technology |
Publication status | Published - 2021 |