Results 11 to 20 of about 224,799 (276)

Nonlinear Secret Image Sharing Scheme [PDF]

open access: yesThe Scientific World Journal, 2014
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic.
Sang-Ho Shin, Gil-Je Lee, Kee-Young Yoo
doaj   +3 more sources

Meaningful Secret Image Sharing with Saliency Detection [PDF]

open access: yesEntropy, 2022
Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed cloud storage.
Jingwen Cheng   +4 more
doaj   +3 more sources

Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images [PDF]

open access: yesJournal of Electronic Imaging, 2013
[[abstract]]A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified ...
[[corresponding]]Chen, Chien-Chang   +1 more
core   +2 more sources

Biometric Privacy Using Secret Image Sharing [PDF]

open access: yesEngineering and Technology Journal, 2017
Biometric technique includes uniquely identifying person based on their physical or behavioral characteristics. It is mainly used for authentication. Iris scanning is one of the most secure techniques among all biometrics because of its uniqueness and ...
A.T. Hashim, D.A. Noori
doaj   +2 more sources

Reversible Image Secret Sharing [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2020
In reversible image secret sharing (RISS), the cover image can be recovered to some degree, and a share can be comprehensible rather than noise-like. Reversible cover images play an important role in law enforcement and medical diagnosis. The comprehensible share can not only reduce the suspicion of attackers but also improve the management efficiency ...
Xuehu Yan   +3 more
openaire   +1 more source

Data Hiding of Multicompressed Images Based on Shamir Threshold Sharing

open access: yesApplied Sciences, 2022
Image-based data hiding methods have been used in the development of various applications in computer vision. At present, there are two main types of data hiding based on secret sharing, namely dual-image data hiding and multi-image data hiding.
Haoyang Kang, Lu Leng, Byung-Gyu Kim
doaj   +1 more source

Two-in-One Secret Image Sharing Scheme with Higher Visual Quality of the Previewed Image

open access: yesMathematics, 2022
Secret image sharing (SIS) scheme is a secret image encoding and decoding scheme that reconstructs the secret image only if the number of participants is sufficient. In contrast, inadequate participants gain no information about the secret image.
Xin Wang, Peng Li, Zihan Ren
doaj   +1 more source

Reversible extended secret image sharing with ability to correct errors based on Chinese remainder theorem

open access: yesHeliyon, 2023
The reversible extended secret image sharing (RESIS) scheme can safely segment the secret image into a shadow image and embed it into the cover image, while ensuring that both the secret image and the cover image are completely restored.
Chaoying Wang   +5 more
doaj   +1 more source

Ramp secret image sharing

open access: yesMathematical Biosciences and Engineering, 2019
Secret image sharing (SIS) belongs to but differs from secret sharing. In general, conventional (k,n) threshold SIS has the shortcoming of "all-or-nothing". In this article, first we introduce ramp SIS definition. Then we propose a (k1,k2,n) ramp SIS based on the Chinese remainder theorem (CRT).
Xuehu Yan   +4 more
openaire   +4 more sources

Image inpainting-based behavior image secret sharing

open access: yesMathematical Biosciences and Engineering, 2020
<abstract> <p>The polynomial-based image secret sharing (ISS) scheme encodes a secret image into <italic>n</italic> shadows assigned to <italic>n</italic> participants. The secret image with high resolution is decoded by Lagrange interpolation when collecting any <italic>k</italic> or more shadows ...
Xuehu Yan   +4 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy