P. Anghelescu, Ionela-Mariana Ionescu, Marian-Bogdan Bodea
{"title":"Design and implementation of a visual cryptography application","authors":"P. Anghelescu, Ionela-Mariana Ionescu, Marian-Bogdan Bodea","doi":"10.1109/ECAI50035.2020.9223191","DOIUrl":null,"url":null,"abstract":"This paper describes the design and implementation of a visual cryptography application. The initial information is processed in the form of an image, following that, a visual encryption algorithm will be applied to this image. It will generate between 2 and 4 sheets that will represent the results of encryption. The decryption is performed by overlapping them in the correct position and visual recognizing by the human eye of the information. Each encryption will generate a set of unique results and the repetition of the encryption will generate another set. This is due, as we explained in this paper, to random choices used in decision points.","PeriodicalId":324813,"journal":{"name":"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"401 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECAI50035.2020.9223191","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper describes the design and implementation of a visual cryptography application. The initial information is processed in the form of an image, following that, a visual encryption algorithm will be applied to this image. It will generate between 2 and 4 sheets that will represent the results of encryption. The decryption is performed by overlapping them in the correct position and visual recognizing by the human eye of the information. Each encryption will generate a set of unique results and the repetition of the encryption will generate another set. This is due, as we explained in this paper, to random choices used in decision points.