An overview of visual cryptography techniques

DR Ibrahim, JS Teh, R Abdullah - Multimedia Tools and Applications, 2021 - Springer
Visual cryptography is an encryption technique that decomposes secret images into multiple
shares. These shares are digitally or physically overlapped to recover the original image …

Hybrid optimization with cryptography encryption for medical image security in Internet of Things

M Elhoseny, K Shankar, SK Lakshmanaprabu… - Neural computing and …, 2020 - Springer
The development of the Internet of Things (IoT) is predicted to change the healthcare
industry and might lead to the rise of the Internet of Medical Things. The IoT revolution is …

An exhaustive review on security issues in cloud computing

S Fatima, S Ahmad - KSII Transactions on Internet and Information …, 2019 - koreascience.kr
Abstract The Cloud Computing is growing rapidly in the current IT industry. Cloud computing
has become a buzzword in relation to Grid & Utility computing. It provides on demand …

Medical image security using dual encryption with oppositional based optimization algorithm

T Avudaiappan, R Balasubramanian… - Journal of medical …, 2018 - Springer
Security is the most critical issue amid transmission of medical images because it contains
sensitive information of patients. Medical image security is an essential method for secure …

RETRACTED ARTICLE: Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique

K Shankar, M Elhoseny, RS Kumar… - Journal of Ambient …, 2020 - Springer
Abstract Secret Image Sharing (SIS) scheme is to encrypt a secret image into 'n'specious
shadows. It is unable to reveal any data on the secret image if at least one of the shadows is …

Adaptive optimal multi key based encryption for digital image security

K Shankar, SK Lakshmanaprabu… - Concurrency and …, 2020 - Wiley Online Library
The security of digital images is an essential and challenging task on shared communication
Model. Generally, high secure working environment and data are also secured with an …

Application of discrete transforms with selective coefficients for blind image watermarking

EL Lydia, JS Raj, R Pandi Selvam… - Transactions on …, 2021 - Wiley Online Library
Watermarking scheme is not helpful in conveying the original image continually so as
identifying the owner's mark from the watermarked image. In the current situation, our …

[PDF][PDF] Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm

K Shankar, SK Lakshmanaprabu - International Journal of …, 2018 - researchgate.net
The security of digital images is a basic and difficult task on the shared communication
channel. Different strategies are utilized to secure the digital image, for example, encryption …

An efficient image encryption scheme based on signcryption technique with adaptive elephant herding optimization

K Shankar, M Elhoseny, E Perumal, M Ilayaraja… - … and Secure Information …, 2019 - Springer
IoT makes incorporated communication circumstances of interconnected devices and stages
by drawing in both practical and substantial worlds simultaneously. The researchers of the …

A novel color visual cryptography approach based on Harris Hawks Optimization Algorithm

D Ibrahim, R Sihwail, KAZ Arrifin, A Abuthawabeh… - Symmetry, 2023 - mdpi.com
Hundreds of millions of people worldwide use computing devices and services, including
smartphones, laptops, and messaging apps. Visual cryptography (VC) is one of the most …