Results 221 to 230 of about 224,799 (276)
A hybrid steganography framework using DCT and GAN for secure data communication in the big data era. [PDF]
Malik KR +7 more
europepmc +1 more source
Compound Meta-Optics for Advanced Optical Engineering. [PDF]
Lee HR, Kim D, Kim SJ.
europepmc +1 more source
Claus Offe (1940–2025): A Tribute to His Academic Work and His Role as a Political Intellectual
Constellations, EarlyView.
Tine Stein
wiley +1 more source
A multi-image codebook approach for secure text transmission. [PDF]
Rashid OF, Tuama SA, Al-Shahwani H.
europepmc +1 more source
Triple-layered security system: reliable and secured image communications over 5G and beyond networks. [PDF]
Srour T +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Computers and Graphics, 2002
Abstract In this paper, we propose a method such that a secret image is shared by n shadow images, and any r shadow images (r⩽n) of them can be used to restore the whole secret image. The size of each shadow image is smaller than the secret image in our method.
Chih-Ching Thien, Ja-Chen Lin
exaly +2 more sources
Abstract In this paper, we propose a method such that a secret image is shared by n shadow images, and any r shadow images (r⩽n) of them can be used to restore the whole secret image. The size of each shadow image is smaller than the secret image in our method.
Chih-Ching Thien, Ja-Chen Lin
exaly +2 more sources
Secret image sharing with smaller shadow images
Pattern Recognition Letters, 2006Secret image sharing is a technique for protecting images that involves the dispersion of the secret image into many shadow images. This endows the method with a higher tolerance against data corruption or loss than other image-protection mechanisms, such as encryption or steganography.
Ran-Zan Wang
exaly +2 more sources
A hierarchical threshold secret image sharing
Pattern Recognition Letters, 2012In the traditional secret image sharing schemes, the shadow images are generated by embedding the secret data into the cover image such that a sufficient number of shadow images can cooperate to reconstruct the secret image. In the process of reconstruction, each shadow image plays an equivalent role. However, a general threshold access structure could
Cheng Guo, Chin-Chen Chang, Chuan Qin
exaly +2 more sources

