Matrix problems induced by visual cryptography schemes

ABSTRACT: In this paper, k-linear representations of posets are used to define lattice-based schemes of visual cryptography for color images.

Autores:
Giraldo Salazar, Hernán Alonso
Moreno Cañadas, Agustín
Serna Vanegas, Robinson Julián
Tipo de recurso:
Article of investigation
Fecha de publicación:
2017
Institución:
Universidad de Antioquia
Repositorio:
Repositorio UdeA
Idioma:
eng
OAI Identifier:
oai:bibliotecadigital.udea.edu.co:10495/44290
Acceso en línea:
https://hdl.handle.net/10495/44290
Palabra clave:
Vista
Eyesight
Material visual
Visual materials
Criptografía
Cryptography
Representaciones de Posets
Criptografía visual
http://vocabularies.unesco.org/thesaurus/concept10668
http://vocabularies.unesco.org/thesaurus/concept508
Rights
openAccess
License
http://creativecommons.org/licenses/by-nc-sa/2.5/co/
id UDEA2_8cb020d8b33b9af591904d298cc01eb1
oai_identifier_str oai:bibliotecadigital.udea.edu.co:10495/44290
network_acronym_str UDEA2
network_name_str Repositorio UdeA
repository_id_str
dc.title.spa.fl_str_mv Matrix problems induced by visual cryptography schemes
title Matrix problems induced by visual cryptography schemes
spellingShingle Matrix problems induced by visual cryptography schemes
Vista
Eyesight
Material visual
Visual materials
Criptografía
Cryptography
Representaciones de Posets
Criptografía visual
http://vocabularies.unesco.org/thesaurus/concept10668
http://vocabularies.unesco.org/thesaurus/concept508
title_short Matrix problems induced by visual cryptography schemes
title_full Matrix problems induced by visual cryptography schemes
title_fullStr Matrix problems induced by visual cryptography schemes
title_full_unstemmed Matrix problems induced by visual cryptography schemes
title_sort Matrix problems induced by visual cryptography schemes
dc.creator.fl_str_mv Giraldo Salazar, Hernán Alonso
Moreno Cañadas, Agustín
Serna Vanegas, Robinson Julián
dc.contributor.author.none.fl_str_mv Giraldo Salazar, Hernán Alonso
Moreno Cañadas, Agustín
Serna Vanegas, Robinson Julián
dc.contributor.researchgroup.spa.fl_str_mv Álgebra, Teoría de Números y Aplicaciones: ERM
Álgebra U de A
dc.subject.unesco.none.fl_str_mv Vista
Eyesight
Material visual
Visual materials
topic Vista
Eyesight
Material visual
Visual materials
Criptografía
Cryptography
Representaciones de Posets
Criptografía visual
http://vocabularies.unesco.org/thesaurus/concept10668
http://vocabularies.unesco.org/thesaurus/concept508
dc.subject.lemb.none.fl_str_mv Criptografía
Cryptography
dc.subject.proposal.spa.fl_str_mv Representaciones de Posets
Criptografía visual
dc.subject.unescouri.none.fl_str_mv http://vocabularies.unesco.org/thesaurus/concept10668
http://vocabularies.unesco.org/thesaurus/concept508
description ABSTRACT: In this paper, k-linear representations of posets are used to define lattice-based schemes of visual cryptography for color images.
publishDate 2017
dc.date.issued.none.fl_str_mv 2017
dc.date.accessioned.none.fl_str_mv 2025-01-21T19:24:47Z
dc.date.available.none.fl_str_mv 2025-01-21T19:24:47Z
dc.type.spa.fl_str_mv Artículo de investigación
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.redcol.spa.fl_str_mv https://purl.org/redcol/resource_type/ART
dc.type.coarversion.spa.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/article
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/publishedVersion
format http://purl.org/coar/resource_type/c_2df8fbb1
status_str publishedVersion
dc.identifier.issn.none.fl_str_mv 0972-0871
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/10495/44290
dc.identifier.doi.none.fl_str_mv 10.17654/MS102061223
dc.identifier.eissn.none.fl_str_mv 0971-4332
identifier_str_mv 0972-0871
10.17654/MS102061223
0971-4332
url https://hdl.handle.net/10495/44290
dc.language.iso.spa.fl_str_mv eng
language eng
dc.relation.citationendpage.spa.fl_str_mv 1241
dc.relation.citationissue.spa.fl_str_mv 6
dc.relation.citationstartpage.spa.fl_str_mv 1223
dc.relation.citationvolume.spa.fl_str_mv 102
dc.relation.ispartofjournal.spa.fl_str_mv Far East Journal of Mathematical Sciences
dc.rights.uri.*.fl_str_mv http://creativecommons.org/licenses/by-nc-sa/2.5/co/
dc.rights.uri.spa.fl_str_mv https://creativecommons.org/licenses/by-nc-sa/4.0/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf2
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-sa/2.5/co/
https://creativecommons.org/licenses/by-nc-sa/4.0/
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.extent.spa.fl_str_mv 19 páginas
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Universidad de Allahabad
dc.publisher.place.spa.fl_str_mv Allahabad, India
institution Universidad de Antioquia
bitstream.url.fl_str_mv https://bibliotecadigital.udea.edu.co/bitstreams/6dceb5fa-9458-4a15-b3de-c29dc59f8c30/download
https://bibliotecadigital.udea.edu.co/bitstreams/bea235b2-9d65-420f-b84e-2264f02fb200/download
https://bibliotecadigital.udea.edu.co/bitstreams/c71214d8-f11e-4226-8820-b4eb373ed9cc/download
https://bibliotecadigital.udea.edu.co/bitstreams/01cc7594-256a-4a79-b677-3d0c8bad152c/download
https://bibliotecadigital.udea.edu.co/bitstreams/e12088e5-d7aa-40a5-a3d2-d9c06f8c79bb/download
bitstream.checksum.fl_str_mv ef3bbc4dc92edbf16916a721fb2b1c2e
e2060682c9c70d4d30c83c51448f4eed
8a4605be74aa9ea9d79846c1fba20a33
948ed9cd9e0538bbb1cf32111a979888
64fdedc46f6604e15bc715080698b485
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional de la Universidad de Antioquia
repository.mail.fl_str_mv aplicacionbibliotecadigitalbiblioteca@udea.edu.co
_version_ 1851052494654799872
spelling Giraldo Salazar, Hernán AlonsoMoreno Cañadas, AgustínSerna Vanegas, Robinson JuliánÁlgebra, Teoría de Números y Aplicaciones: ERMÁlgebra U de A2025-01-21T19:24:47Z2025-01-21T19:24:47Z20170972-0871https://hdl.handle.net/10495/4429010.17654/MS1020612230971-4332ABSTRACT: In this paper, k-linear representations of posets are used to define lattice-based schemes of visual cryptography for color images.Universidad de Antioquia. Vicerrectoría de investigación. Comité para el Desarrollo de la Investigación - CODIColombia. Ministerio de Ciencia, Tecnología e Innovación - MinCienciasCOL0017217COL008689619 páginasapplication/pdfengUniversidad de AllahabadAllahabad, Indiahttp://creativecommons.org/licenses/by-nc-sa/2.5/co/https://creativecommons.org/licenses/by-nc-sa/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Matrix problems induced by visual cryptography schemesArtículo de investigaciónhttp://purl.org/coar/resource_type/c_2df8fbb1https://purl.org/redcol/resource_type/ARThttp://purl.org/coar/version/c_970fb48d4fbd8a85info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionVistaEyesightMaterial visualVisual materialsCriptografíaCryptographyRepresentaciones de PosetsCriptografía visualhttp://vocabularies.unesco.org/thesaurus/concept10668http://vocabularies.unesco.org/thesaurus/concept508124161223102Far East Journal of Mathematical SciencesEstrategia de Sostenibilidad 2016-20170266- 2013RoR:03bp5hc83RoR:03fd5ne08PublicationORIGINALGiraldoHernan_2017_Matrix_Cryptography_Visual.pdfGiraldoHernan_2017_Matrix_Cryptography_Visual.pdfArtículo de investigaciónapplication/pdf238476https://bibliotecadigital.udea.edu.co/bitstreams/6dceb5fa-9458-4a15-b3de-c29dc59f8c30/downloadef3bbc4dc92edbf16916a721fb2b1c2eMD51trueAnonymousREADCC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-81051https://bibliotecadigital.udea.edu.co/bitstreams/bea235b2-9d65-420f-b84e-2264f02fb200/downloade2060682c9c70d4d30c83c51448f4eedMD52falseAnonymousREADLICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://bibliotecadigital.udea.edu.co/bitstreams/c71214d8-f11e-4226-8820-b4eb373ed9cc/download8a4605be74aa9ea9d79846c1fba20a33MD53falseAnonymousREADTEXTGiraldoHernan_2017_Matrix_Cryptography_Visual.pdf.txtGiraldoHernan_2017_Matrix_Cryptography_Visual.pdf.txtExtracted texttext/plain30167https://bibliotecadigital.udea.edu.co/bitstreams/01cc7594-256a-4a79-b677-3d0c8bad152c/download948ed9cd9e0538bbb1cf32111a979888MD54falseAnonymousREADTHUMBNAILGiraldoHernan_2017_Matrix_Cryptography_Visual.pdf.jpgGiraldoHernan_2017_Matrix_Cryptography_Visual.pdf.jpgGenerated Thumbnailimage/jpeg8553https://bibliotecadigital.udea.edu.co/bitstreams/e12088e5-d7aa-40a5-a3d2-d9c06f8c79bb/download64fdedc46f6604e15bc715080698b485MD55falseAnonymousREAD10495/44290oai:bibliotecadigital.udea.edu.co:10495/442902025-03-26 23:16:17.793http://creativecommons.org/licenses/by-nc-sa/2.5/co/open.accesshttps://bibliotecadigital.udea.edu.coRepositorio Institucional de la Universidad de Antioquiaaplicacionbibliotecadigitalbiblioteca@udea.edu.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