Results 221 to 230 of about 224,799 (276)

A hybrid steganography framework using DCT and GAN for secure data communication in the big data era. [PDF]

open access: yesSci Rep
Malik KR   +7 more
europepmc   +1 more source

Secret image sharing

Computers and Graphics, 2002
Abstract In this paper, we propose a method such that a secret image is shared by n shadow images, and any r shadow images (r⩽n) of them can be used to restore the whole secret image. The size of each shadow image is smaller than the secret image in our method.
Chih-Ching Thien, Ja-Chen Lin
exaly   +2 more sources

Secret image sharing with smaller shadow images

Pattern Recognition Letters, 2006
Secret image sharing is a technique for protecting images that involves the dispersion of the secret image into many shadow images. This endows the method with a higher tolerance against data corruption or loss than other image-protection mechanisms, such as encryption or steganography.
Ran-Zan Wang
exaly   +2 more sources

A hierarchical threshold secret image sharing

Pattern Recognition Letters, 2012
In the traditional secret image sharing schemes, the shadow images are generated by embedding the secret data into the cover image such that a sufficient number of shadow images can cooperate to reconstruct the secret image. In the process of reconstruction, each shadow image plays an equivalent role. However, a general threshold access structure could
Cheng Guo, Chin-Chen Chang, Chuan Qin
exaly   +2 more sources

Home - About - Disclaimer - Privacy