ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Social Sciences
Communication
Technology
Research
Literature
Languages
Architecture and Urbanism
Computing
Computing
all records (75)

Languages
English
Spanish
Portuguese
German
French
Finnish

Countries
Indonesia
Brazil
USA
Spain
Chile
Ukraine
Colombia
Argentina
Canada
Cuba
all records (78)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
30.215  Articles
1 of 3.023 pages  |  10  records  |  more records»
This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. The system was implemented in Java EE on a web-based interface, with MySQL database server and Glassfish application server as the bac... see more

Fraud and counterfeiting have caused various inconveniences to manufacturers and the product consumer market. To avoid counterfeiting and, therefore, bring a higher level of trust and security in commercial transactions, several authentication techniques ... see more

Phishing and identity theft are common threats of online shopping. Phishing is an attempt to steal personal data from legitimate user. In this paper we propose a secure e-payment method using a credit card based on visual cryptography. This method adopts ... see more

An important problem in visual cryptography is the alignment problem. Although Liu, et al. have proposed a method for aligning the shares, there is still a problem with the non-identical mathematical support visual cryptography schemes. For overcoming thi... see more

The subject matter of the article is the informational technology of designing and using of augmented reality visual information structures. The goal of the study is to develop the informational technology of designing and using of augmented reality visua... see more

The subject matter of the article is the informational technology of designing and using of augmented reality visual information structures. The goal of the study is to develop the informational technology of designing and using of augmented reality visua... see more

With the growth in digital world, it is becoming more important to find a method toprotect the security of digital media. An image watermarking model based on visual secretsharing (VSS) is proposed for protection of ownership. In the embedding phase, thew... see more

The intent of this paper is to present some of the major things about visual cryptography for colour images. The idea behind this technique is quite simple and powerful. Visual cryptography deals with visual information like picture, printed text and writ... see more

One of the algorithms in cryptography that can be used for school database security is the IDEA (International Data Encryption Algorithm) algorithm. The IDEA algorithm is one of the cryptographic algorithms that has various applications in secure data tra... see more

1 of 3.023 pages  |  10  records  |  more records»