Results 241 to 250 of about 224,799 (276)
Some of the next articles are maybe not open access.
Secret Sharing Using Meaningful Images
Journal of Advanced Management Science, 2013In recent years, image sharing method has attracted much attention for protecting the security of secret images. Pixel expansion, meaningless sharing, and bad recovering quality are the important issues that need to be improved. The paper proposes a new image sharing method to remove the above problems.
openaire +1 more source
A new Boolean-based multiple secret image sharing scheme to share different sized secret images
Journal of Information Security and Applications, 2017The proposed Boolean-based multiple secret image sharing technique can share many secret images among participants using low computational Boolean operations. Previous studies dealt with sharing identically sized secret images; however, secret images may be of different sizes when applied to general usage.
Chien-Chang Chen, Jun-Long Chen
openaire +2 more sources
Fast-weighted secret image sharing
Optical Engineering, 2009Thien and Lin [Comput. and Graphics 26 (5), 765-770 (2002)] proposed a threshold scheme to share a secret image among n shadows: any t of the n shadows can recover the secret, whereas t-1 or fewer shadows cannot. However, in real life, certain managers probably play key roles to run a company and thus need special authority to recover the secret in ...
openaire +1 more source
Invertible secret image sharing with steganography
Pattern Recognition Letters, 2010The essence of invertible image sharing approaches is that the revealed content of the secret image must be lossless and the distorted stego images must be able to be reverted to the original cover image. In order to achieve these purposes, we first transform the secret pixels into the m-ary notational system and then calculate the information data ...
Pei-Yu Lin, Chi-Shiang Chan
openaire +1 more source
Nested compartment secret image sharing scheme
2014 22nd Signal Processing and Communications Applications Conference (SIU), 2014In the traditional secret sharing schemes, all participants are equal in terms of privileges but in special situations participants may not be equal. In this article we consider generalized compartment access structure and linear secret sharing schemes for their realization.
Katira Soleymanzadeh, Vasif V. Nabiyev
openaire +1 more source
Secret Image Sharing with Threshold Set
Applied Mechanics and Materials, 2012Secret image sharing is an attractive research problem in information security filed. According to the high redundancy of the digital image, the paper proposed an entirely new secret image sharing scheme with threshold set. The new scheme makes secret image sharing more flexible, so we can apply the secret image sharing technology to more fields such ...
Dan Tang, Kui Liu
openaire +1 more source
A Robust Secret Image Sharing Scheme
2008 First International Conference on Emerging Trends in Engineering and Technology, 2008Secret sharing is an efficient method of transmitting the image securely. This paper discusses an efficient secret sharing scheme. It has been shown through the experimental result that the proposed scheme transmits the image secretly and then efficiently recovers the same at the receiver end.
Vinay Rishiwal, Mano Yadav, K.V. Arya
openaire +1 more source
Sharing secret images using shadow codebooks
Information Sciences, 1998Abstract A practical specific (r, n) threshold scheme for secret digital images is proposed in this paper. By this scheme, we divide a secret digital image into n pieces and distribute them to n participants. The secret digital image can be reconstructed when and only when r or more participants cooperate for it.
Chin-Chen Chang, Ren-Junn Hwang
openaire +1 more source
Reversible essential image secret sharing
Optics & Laser Technology, 2023Dong Xie +4 more
openaire +1 more source
Parallel Processing for Secret Image Sharing
International Symposium on Parallel and Distributed Processing with Applications, 2010Secret image sharing is a method to transmit and store an image safely. The security of secret image sharing is based on the fact that the values are operated in the finite field and the number of pixels is high enough to ensure security. However, the time complexity to encode and decode a secret image is not acceptable in real-time application.
openaire +1 more source

