Results 31 to 40 of about 224,799 (276)
Analysis of Secret Image Sharing using Shared Image
secret image sharing scheme with steganography lacks to provide the authentication, quality of stego-image and more cheating done by the dishonest participants. So, a secret image sharing using shared image technique is proposed to prevent the participants from the subsidiary stipulation of a false stego-image (an image containing the hidden secret ...
R.K.Selva Kumar, I. EdwinDayanand
openaire +1 more source
Diagonal queue medical image steganography with Rabin cryptosystem [PDF]
The main purpose of this work is to provide a novel and efficient method to the image steganography area of research in the field of biomedical, so that the security can be given to the very precious and confidential sensitive data of the patient and at ...
Mamta Jain, Saroj Kumar Lenka
core +1 more source
A secret sharing scheme suitable for encrypting colour images is introduced. The required colour shares are obtained during encryption by operating at the bit-levels. Perfect reconstruction is achieved by the decryption module using only logical operations.
R. Lukac, K.N. Plataniotis
openaire +1 more source
Significant Secret Image Sharing Scheme Based on Boolean Operation
Traditionally, (k, n) secret image sharing is an approach of breaking down a secret image into n number of shadow images to assign them to n number of users, so that any k or more then k users can bring back the secret image.
Verma Monu, Rani Rajneesh
doaj +1 more source
Secure secret sharing in the cloud [PDF]
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets.
Chang, Ching-Chun, Li, Chang-Tsun
core +1 more source
Threshold Secret Image Sharing [PDF]
A (k,n) threshold secret image sharing scheme, abbreviated as (k,n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret image exactly. In 2002, for (k,n)-TSISS, Thien and Lin reduced the size of each shadow image to $\frac{1}{k}$ of the original secret image.
Teng Guo +5 more
openaire +1 more source
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications [PDF]
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function evaluation (SFE) which enables two parties to jointly compute a function without disclosing their private inputs.
Koushanfar, Farinaz +5 more
core +2 more sources
Secret Image Sharing Scheme Based on a Boolean Operation
Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is high. Some research papers on secret image sharing are also available with smaller reconstruction
Nag Amitava +3 more
doaj +1 more source
New Secret Sharing Scheme Based on Faster R-CNNs Image Retrieval
Secret image sharing has been attracting considerable research attention in recent years as images become ubiquitous on the Internet and mobile applications.
Jianjun Li +5 more
doaj +1 more source
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data [PDF]
Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications.
Elmehdwi, Yousef +2 more
core +3 more sources

