Results 1 to 10 of about 224,799 (276)

Essential Multi-Secret Image Sharing for Sensor Images [PDF]

open access: yesJournal of Imaging
In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels
Shang-Kuan Chen
doaj   +2 more sources

Visual secret sharing and related Works -A Review [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2023
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj   +1 more source

An Implementation of Image Secret Sharing Scheme Based on Matrix Operations

open access: yesMathematics, 2022
The image secret sharing scheme shares a secret image as multiple shadows. The secret image can be recovered from shadow images that meet a threshold number.
Zihan Ren, Peng Li, Xin Wang
doaj   +1 more source

A Secret Image Sharing Based on Logistic-Chebyshev Chaotic Map and Chinese Remainder Theorem [PDF]

open access: yesComputer Science Journal of Moldova, 2023
Visual secret sharing (VSS) was introduced in order to solve information security issues. It is a modern cryptographic technique. It involves breaking up a secret image into $n$ secured components known as shares.
Asmaa Hilmi   +2 more
doaj   +1 more source

Secret Image Sharing Schemes: A Comprehensive Survey

open access: yesIEEE Access, 2023
The safeguarding of digitized data against unwanted access and modification has become an issue of utmost importance as a direct result of the rapid development of network technology and internet applications.
Sanchita Saha   +4 more
doaj   +1 more source

XOR-Based Progressively Secret Image Sharing

open access: yesMathematics, 2021
Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily.
Cheng-Shian Lin   +2 more
doaj   +1 more source

Applying cheating identifiable secret sharing scheme in multimedia security

open access: yesEURASIP Journal on Image and Video Processing, 2020
In (k,n) secret sharing scheme, one secret is encrypted into n shares in such a way that only k or more shares can decrypt the secret. Secret sharing scheme can be extended into the field of multimedia that provides an efficient way to protect ...
Zheng Ma   +4 more
doaj   +1 more source

Robust Secret Image Sharing Scheme Against Noise in Shadow Images

open access: yesIEEE Access, 2021
The (k, n)-threshold secret image sharing scheme is an image protection method, whose security comes partly from precise mathematical calculations, and even a little change in shadow images will lead to a false recovered image.
Yuyuan Sun   +4 more
doaj   +1 more source

Boolean-Based (k, n, m) Multi-Secret Image Sharing

open access: yesAxioms, 2022
Multi-secret image sharing technology shares multiple secret images among shared images for participants and the recovery requires enough shared images for fulfilling the security property.
Chien-Chang Chen   +2 more
doaj   +1 more source

The Visual Secret Sharing Scheme Based on the Rgb Color System [PDF]

open access: yes, 2017
The visual secret sharing (VSS) scheme is a method to maintain the confidentiality of a se-cret image by sharing it to some number participants.
Adithia, M. T. (Mariskha)   +1 more
core   +3 more sources

Home - About - Disclaimer - Privacy