Results 21 to 30 of about 224,799 (276)
(k,n) secret image sharing scheme capable of cheating detection
In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-shadows that satisfy the following: (1) any less than k image-shadows get no information on the image and (2) any k or more image-shadows can reconstruct the ...
Yan-Xiao Liu +2 more
doaj +1 more source
Adaptive Partial Image Secret Sharing [PDF]
In contrast to encrypting the full secret image in classic image secret sharing (ISS), partial image secret sharing (PISS) only encrypts part of the secret image due to the situation that, in general, only part of the secret image is sensitive or secretive.
Xuehu Yan +3 more
openaire +1 more source
A Linear Algebraic Threshold Essential Secret Image Sharing Scheme
A secret sharing scheme allocates to each participant a share of a secret in such a way that authorized subsets of participants can reconstruct the secret, while shares of unauthorized subsets of participants provide no useful information about the ...
Mohammad Ghebleh +2 more
doaj +1 more source
On the Semantic Security of Secret Image Sharing Methods [PDF]
In this paper, a cryptanalysis is performed of the previous secret image sharing methods and an improvement is proposedIn this work, we analyze some of the existing secret image sharing methods and show that they do not possess indistinguishability, a ...
Atrey, Pradeep +2 more
core +1 more source
A novel quality assessment for visual secret sharing schemes [PDF]
To evaluate the visual quality in visual secret sharing schemes, most of the existing metrics fail to generate fair and uniform quality scores for tested reconstructed images.
Jiang, Feng, King, Brian
core +1 more source
Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images
In today's era of developed network, it is particularly important to ensure the security of information. Secret image sharing is a kind of secret information protection technology with loss tolerance by sharing a secret image to a number of shadow images.
Qinghong Gong +3 more
doaj +1 more source
A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management
With the spread of the Internet, the speed of data spread is getting faster and faster. It benefits us a lot but also brings us many potential security problems, especially the problem of privacy leakage. For example, more and more people choose to store
Zhen Wu, Yining Liu, Xingxing Jia
doaj +1 more source
ESSVCS: an enriched secret sharing visual cryptography [PDF]
Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics.
A. Shamir +17 more
core +1 more source
Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm
Reversible Data Hiding in Encrypted Image (RDHEI) is a technology for embedding secret information in an encrypted image. It allows the extraction of secret information and lossless decryption and the reconstruction of the original image.
Chi-Yao Weng, Cheng-Hsing Yang
doaj +1 more source
A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection
Secret image sharing is a technique for sharing a secret message in such a fashion that stego image shadows are generated and distributed to individual participants.
Ching-Chun Chang +3 more
doaj +1 more source

