Visual Cryptography-5


COMPUTER COURSE ONLINE

A Watermarking Technique based on Visual Cryptography

FREE-DOWNLOAD [PDF] B Surekha, DGN Swamy, DKS Rao… – Journal of Information …, 2009
. perceived as such, and have wider applications than visible watermarks [2]. In general an effective
watermarking scheme  . In his method a secret key is used as a seed to select random pixels within
the  . Stacking both these transparencies will permit visual recovery of the secret. 




IEEE PAPER UNITED STATES