Results 41 to 50 of about 120 (52)
A New Watermarking Algorithm Based on Human Visual System for Content Integrity Verification of Region of Interest [PDF]
This paper proposes a semi-fragile, robust-to-JPEG2000 compression watermarking method which is based on the Human Visual System (HVS). This method is designed to verify the content integrity of Region of Interest (ROI) in tele-radiology images.
Fatemizadeh, Emad, Maneshi, Mona
core +1 more source
Minimal Linear Codes Constructed from Sunflowers. [PDF]
Wu X, Lu W.
europepmc +1 more source
Probabilistic Infinite Secret Sharing
The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes.
Csirmaz, László
core
Compartmented Secret Sharing Based on the Chinese Remainder Theorem [PDF]
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) which are distributed to users. The secret may be recovered only by certain predetermined groups. In case of compartmented secret sharing, the set of users
Sorin Iftene
core
Sum graph based access structure in a secret sharing scheme [PDF]
Secret sharing scheme is a method to distribute secret information to a set P of participants so that only authorised subsets of P can reconstruct the secret.
Miller, Mirka +2 more
core +1 more source
AUTHENTICATED MULTIPLE KEY DISTRIBUTION USING SIMPLE CONTINUED FRACTION
S. Srinivasan +2 more
semanticscholar +1 more source
On the information ratio of graphs with many leaves [PDF]
Gyarmati, Máté, Ligeti, Péter
core +1 more source
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist. [PDF]
Katsumata S, Lai YF, LeGrow JT, Qin L.
europepmc +1 more source
A case study in almost-perfect security for unconditionally secure communication [PDF]
core +1 more source

