Results 41 to 50 of about 224,799 (276)

Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares

open access: yesMathematics, 2020
A Multi Secret Image sharing scheme can share several secret images among certain participators securely. Boolean-based secret sharing schemes are one kind of secret sharing method with light-weighted computation compared to the previous complex ...
Hongliang Cai, Dan Tang
doaj   +1 more source

A Novel (k,n) Secret Sharing Scheme from Quadratic Residues for Grayscale Images

open access: yes, 2014
A new grayscale image encryption algorithm based on $(k,n)$ threshold secret sharing is proposed. The scheme allows a secret image to be transformed into $n$ shares, where any $k \le n$ shares can be used to reconstruct the secret image, while the ...
Abdelsatir, El-Tigani B.   +3 more
core   +1 more source

Mathematical methods in solutions of the problems from the Third International Students' Olympiad in Cryptography [PDF]

open access: yes, 2017
The mathematical problems and their solutions of the Third International Students' Olympiad in Cryptography NSUCRYPTO'2016 are presented. We consider mathematical problems related to the construction of algebraic immune vectorial Boolean functions and ...
Agievich, S.   +7 more
core   +3 more sources

Visual Cryptography Vs Bit Level Secret Sharing For Image Encryption [PDF]

open access: yesEngineering and Technology Journal, 2010
Secret sharing is a scheme used to distribute secret among a group of users.Rather than making duplicated copies of secrets among users, the secret is dividedinto a number of pieces, called shares.
Musaab R. Abdulrazzaq
doaj   +1 more source

A review on medicinal properties of saffron toward major diseases [PDF]

open access: yes, 2016
The stigma of Crocus sativus, known as saffron, is one of the most expensive spices in the world. The bioactive components in saffron, picrocrocin, crocin, and safranal, have demonstrated a wide range of uses and capabilities in the medical field.
Abd Razak, Saiful Izwan   +4 more
core   +2 more sources

A novel secret sharing scheme using multiple share images

open access: yesMathematical Biosciences and Engineering, 2019
Secret image sharing has been widely applied in numerous areas, such as military imaging systems, remote sensing, and so on. One of the problems for image sharing schemes is to efficiently recover original images from their shares preserved by the shareholders.
Xiaoping Li   +3 more
openaire   +4 more sources

A Randomized Kernel-Based Secret Image Sharing Scheme

open access: yes, 2018
This paper proposes a ($k,n$)-threshold secret image sharing scheme that offers flexibility in terms of meeting contrasting demands such as information security and storage efficiency with the help of a randomized kernel (binary matrix) operation.
Akella, Ravi Tej   +2 more
core   +1 more source

Silicified Wood‐Inspired, High‐Strength Fire‐Resistant Chitin‐Based Aerogels for Sustainable High‐Temperature Thermal Insulation

open access: yesAdvanced Functional Materials, EarlyView.
Inspired by natural silicified wood, a biomimetic mineralized chitin‐derived aerogel is constructed. It can withstand 81 000 times its own weight, and its backside temperature is 130.4°C after exposure to ∼1300°C butane flame for 600 s, exhibiting high‐strength, fire‐resistance, and super thermal‐insulation properties.
Kai Xu   +11 more
wiley   +1 more source

Study of Free‐Space Optical Quantum Network: Review and Prospectives

open access: yesAdvanced Science, EarlyView.
Free from the constraints of fiber connections, free‐space quantum network enables longer and more flexible quantum network connections. This review summarizes and comparatively analyzes free‐space quantum network experiments based on ground stations, satellites, and mobile platforms.
Hua‐Ying Liu, Zhenda Xie, Shining Zhu
wiley   +1 more source

Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing

open access: yesSensors, 2023
Reversible data hiding in encrypted images (RDH-EI) is instrumental in image privacy protection and data embedding. However, conventional RDH-EI models, involving image providers, data hiders, and receivers, limit the number of data hiders to one, which ...
Haoyang Yu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy