Results 41 to 50 of about 120 (52)

A New Watermarking Algorithm Based on Human Visual System for Content Integrity Verification of Region of Interest [PDF]

open access: yes, 2012
This paper proposes a semi-fragile, robust-to-JPEG2000 compression watermarking method which is based on the Human Visual System (HVS). This method is designed to verify the content integrity of Region of Interest (ROI) in tele-radiology images.
Fatemizadeh, Emad, Maneshi, Mona
core   +1 more source

Probabilistic Infinite Secret Sharing

open access: yes, 2013
The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes.
Csirmaz, László
core  

Compartmented Secret Sharing Based on the Chinese Remainder Theorem [PDF]

open access: yes, 2007
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) which are distributed to users. The secret may be recovered only by certain predetermined groups. In case of compartmented secret sharing, the set of users
Sorin Iftene
core  

Sum graph based access structure in a secret sharing scheme [PDF]

open access: yes
Secret sharing scheme is a method to distribute secret information to a set P of participants so that only authorised subsets of P can reconstruct the secret.
Miller, Mirka   +2 more
core   +1 more source

AUTHENTICATED MULTIPLE KEY DISTRIBUTION USING SIMPLE CONTINUED FRACTION

open access: yes, 2013
S. Srinivasan   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy