Results 231 to 240 of about 224,799 (276)
Some of the next articles are maybe not open access.
Signal Processing: Image Communication, 2007
In this paper, we propose an innovative scheme, namely the scalable secret image sharing scheme, for sharing an image O among n participants such that the clarity of the reconstructed image (i.e., the amount of information therein) scales with proportion with the number of the participants.
Ran-Zan Wang, Shyong-Jian Shyu
openaire +1 more source
In this paper, we propose an innovative scheme, namely the scalable secret image sharing scheme, for sharing an image O among n participants such that the clarity of the reconstructed image (i.e., the amount of information therein) scales with proportion with the number of the participants.
Ran-Zan Wang, Shyong-Jian Shyu
openaire +1 more source
Relations Between Secret Sharing and Secret Image Sharing
2019Secret sharing (SS) for (k, n) threshold generates secret data into n shadows, where any k or more shadows can reconstruct the secret while any \(k-1\) or less shadows reconstruct nothing of the secret. SS is useful for cloud computing security, block chain security and so on.
Xuehu Yan +5 more
openaire +1 more source
Construction-Based Secret Image Sharing
2020Most secret image sharing (SIS) schemes output noise-like shadows and are fragile to any noise due to their restoring methods are based on mathematical operations. A noise-like shadow increases the suspicion of an attacker and the fragileness leads to the secret pixel is wrongly restored even if a bit error occurs.
Xuehu Yan +4 more
openaire +1 more source
Computationally secure secret image sharing
2017 Iranian Conference on Electrical Engineering (ICEE), 2017A secret image sharing scheme is used to protect the confidentiality of important images and also to safeguard them against single point of failure. the first proposed secret image sharing scheme used a technique to reduce the size of shares to 1/t of the secret, the benefits of small share size drawn the attention of many researchers to that technique
Amir M. Ahmadian, Maryam Amirmazlaghani
openaire +1 more source
Multiple Secret Images Sharing Scheme
2008 IEEE Region 10 and the Third international Conference on Industrial and Information Systems, 2008Secret sharing is an efficient method of transmitting the image securely. This paper discusses an efficient secret sharing scheme for multiple secret images. It has been shown through the experimental result that the proposed scheme transmits the images secretly and then efficiently recovers the same at the receiver end.
Vinay Rishiwal +3 more
openaire +1 more source
Visual Cryptography and Secret Image Sharing
2017With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and ...
S. Cimato, C. N. Yang
openaire +2 more sources
An Image Secret Sharing Method
2006 9th International Conference on Information Fusion, 2006This paper presents an image secret sharing method which essentially incorporates two k-out-of-n secret sharing schemes: i) Shamir's secret sharing scheme and ii) matrix projection secret sharing scheme. The technique allows a secret image to be divided as n image shares so that: i) any k image shares (k ? n) can be used to reconstruct the secret image
Li Bai +3 more
openaire +1 more source
Multi-layer Secret Image Sharing
2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2010Secret image sharing is a sharing method to transmit and store images with fault tolerance property. The paper proposes a recursive method to extend conventional secret image sharing more general in application which is named multi-layer secret image sharing. It enables users more controllability to secret images than conventional secret image sharing.
openaire +1 more source
Multiple secret images in multiple sharing images
SPIE Proceedings, 2012Internet based communications are evolving at a tremendous rate. Encryption of data has become an important way to protect data resources especially on the Internet, intranets and extranets. Steganography is a process of hiding data inside a sharing medium. A technique of hiding multiple images in multiple sharing images is proposed.
Rajasekar Velswamy +3 more
openaire +1 more source
Exploring secret image sharing with embedding of shares
2018 2nd International Conference on Inventive Systems and Control (ICISC), 2018Protecting the confidentiality of information has become a significant issue in information security. Secret sharing is an important technique that helps to protect the confidentiality of information. A dealer divides a secret into several shares that are distributed among a group of participants.
Priyanka R Kamble, Sonali Patil
openaire +1 more source

