Results 31 to 40 of about 224,799 (276)

Analysis of Secret Image Sharing using Shared Image

open access: yesInternational Journal of Computer Applications, 2014
secret image sharing scheme with steganography lacks to provide the authentication, quality of stego-image and more cheating done by the dishonest participants. So, a secret image sharing using shared image technique is proposed to prevent the participants from the subsidiary stipulation of a false stego-image (an image containing the hidden secret ...
R.K.Selva Kumar, I. EdwinDayanand
openaire   +1 more source

Diagonal queue medical image steganography with Rabin cryptosystem [PDF]

open access: yes, 2016
The main purpose of this work is to provide a novel and efficient method to the image steganography area of research in the field of biomedical, so that the security can be given to the very precious and confidential sensitive data of the patient and at ...
Mamta Jain, Saroj Kumar Lenka
core   +1 more source

Colour image secret sharing

open access: yesElectronics Letters, 2004
A secret sharing scheme suitable for encrypting colour images is introduced. The required colour shares are obtained during encryption by operating at the bit-levels. Perfect reconstruction is achieved by the decryption module using only logical operations.
R. Lukac, K.N. Plataniotis
openaire   +1 more source

Significant Secret Image Sharing Scheme Based on Boolean Operation

open access: yesCybernetics and Information Technologies, 2017
Traditionally, (k, n) secret image sharing is an approach of breaking down a secret image into n number of shadow images to assign them to n number of users, so that any k or more then k users can bring back the secret image.
Verma Monu, Rani Rajneesh
doaj   +1 more source

Secure secret sharing in the cloud [PDF]

open access: yes, 2017
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets.
Chang, Ching-Chun, Li, Chang-Tsun
core   +1 more source

Threshold Secret Image Sharing [PDF]

open access: yes, 2013
A (k,n) threshold secret image sharing scheme, abbreviated as (k,n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret image exactly. In 2002, for (k,n)-TSISS, Thien and Lin reduced the size of each shadow image to $\frac{1}{k}$ of the original secret image.
Teng Guo   +5 more
openaire   +1 more source

Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications [PDF]

open access: yes, 2017
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function evaluation (SFE) which enables two parties to jointly compute a function without disclosing their private inputs.
Koushanfar, Farinaz   +5 more
core   +2 more sources

Secret Image Sharing Scheme Based on a Boolean Operation

open access: yesCybernetics and Information Technologies, 2014
Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is high. Some research papers on secret image sharing are also available with smaller reconstruction
Nag Amitava   +3 more
doaj   +1 more source

New Secret Sharing Scheme Based on Faster R-CNNs Image Retrieval

open access: yesIEEE Access, 2018
Secret image sharing has been attracting considerable research attention in recent years as images become ubiquitous on the Internet and mobile applications.
Jianjun Li   +5 more
doaj   +1 more source

k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data [PDF]

open access: yes, 2014
Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications.
Elmehdwi, Yousef   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy