Results 21 to 30 of about 224,799 (276)

(k,n) secret image sharing scheme capable of cheating detection

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-shadows that satisfy the following: (1) any less than k image-shadows get no information on the image and (2) any k or more image-shadows can reconstruct the ...
Yan-Xiao Liu   +2 more
doaj   +1 more source

Adaptive Partial Image Secret Sharing [PDF]

open access: yesSymmetry, 2020
In contrast to encrypting the full secret image in classic image secret sharing (ISS), partial image secret sharing (PISS) only encrypts part of the secret image due to the situation that, in general, only part of the secret image is sensitive or secretive.
Xuehu Yan   +3 more
openaire   +1 more source

A Linear Algebraic Threshold Essential Secret Image Sharing Scheme

open access: yesMathematics, 2022
A secret sharing scheme allocates to each participant a share of a secret in such a way that authorized subsets of participants can reconstruct the secret, while shares of unauthorized subsets of participants provide no useful information about the ...
Mohammad Ghebleh   +2 more
doaj   +1 more source

On the Semantic Security of Secret Image Sharing Methods [PDF]

open access: yes, 2013
In this paper, a cryptanalysis is performed of the previous secret image sharing methods and an improvement is proposedIn this work, we analyze some of the existing secret image sharing methods and show that they do not possess indistinguishability, a ...
Atrey, Pradeep   +2 more
core   +1 more source

A novel quality assessment for visual secret sharing schemes [PDF]

open access: yes, 2017
To evaluate the visual quality in visual secret sharing schemes, most of the existing metrics fail to generate fair and uniform quality scores for tested reconstructed images.
Jiang, Feng, King, Brian
core   +1 more source

Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images

open access: yesIEEE Access, 2019
In today's era of developed network, it is particularly important to ensure the security of information. Secret image sharing is a kind of secret information protection technology with loss tolerance by sharing a secret image to a number of shadow images.
Qinghong Gong   +3 more
doaj   +1 more source

A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management

open access: yesMathematics, 2020
With the spread of the Internet, the speed of data spread is getting faster and faster. It benefits us a lot but also brings us many potential security problems, especially the problem of privacy leakage. For example, more and more people choose to store
Zhen Wu, Yining Liu, Xingxing Jia
doaj   +1 more source

ESSVCS: an enriched secret sharing visual cryptography [PDF]

open access: yes, 2013
Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics.
A. Shamir   +17 more
core   +1 more source

Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm

open access: yesEntropy, 2023
Reversible Data Hiding in Encrypted Image (RDHEI) is a technology for embedding secret information in an encrypted image. It allows the extraction of secret information and lossless decryption and the reconstruction of the original image.
Chi-Yao Weng, Cheng-Hsing Yang
doaj   +1 more source

A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection

open access: yesSensors, 2020
Secret image sharing is a technique for sharing a secret message in such a fashion that stego image shadows are generated and distributed to individual participants.
Ching-Chun Chang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy