Results 71 to 80 of about 224,799 (276)
A novel meaningful secret image sharing method based on Arabic letters
In recent years, the providing of information security for multimedia has become an important subject of study. Visual cryptography and secret sharing is protected image contents without using complex mathematically operators.
Derya Avci
doaj
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea +1 more
doaj +1 more source
Fueling Tomorrow: Scenario Planning for the Future of Gas Stations
ABSTRACT Transport electrification is reshaping the service infrastructures that mediate everyday mobility, yet most electrification scenario studies remain macrolevel and offer limited insight into how incumbent forecourt (gas‐station) networks can adapt under deep uncertainty.
Joao Gabriel Rosa +2 more
wiley +1 more source
A Construction Method of (2, 3) Visual Cryptography Scheme
Visual cryptography scheme (VCS) shares a binary secret image into multiple shadows, stacking qualified set of shadows will decode the secret image without computer resources.
Peng Li +3 more
doaj +1 more source
A Recursive Threshold Visual Cryptography Scheme [PDF]
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter ...
Kak, Subhash, Parakh, Abhishek
core +1 more source
Transformation Teams Leading the Hispanic‐Serving Institutions Movement at HSI Community Colleges
ABSTRACT The Department of Education defunded discretionary grant programs for enrollment‐based minority‐serving institutions (MSIs) on September 10, 2025, yet Hispanic‐serving institutions (HSIs) still exist and must continue to adapt to their growing population of Latine/x students.
Gina Ann Garcia +2 more
wiley +1 more source
Weighted Threshold Secret Image Sharing [PDF]
Given a secret image I, a threshold r, and a set of n ( ≥ r) participants P = {1, 2, ... , n} with a set of weights W = {w 1, w 2, ... , w n } where w i is the weight (which indicates the degree/rank of importance) of participant i and we assume that w 1 ≤ w 2 ≤ ... w n . The idea of weighted threshold secret image sharing encodes I into n shadows S 1,
Shyong Jian Shyu +3 more
openaire +1 more source
Abstract Hydrogen plays a crucial role across multiple industrial sectors and is increasingly recognized as a clean energy carrier with significant potential in decarbonization efforts. Methane pyrolysis (MP), particularly using molten metal catalysts, offers a promising pathway for hydrogen production with low CO2 emissions.
Adrian Paredes Bozzo, Zukui Li
wiley +1 more source
PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES [PDF]
Visual secret sharing schemes (VSS) represent an important concept of visual cryptography. They permit the sharing of a secret image between multiple participants so that only authorized groups can recover the secret.
Ruxandra Olimid
core
A partial envelope approach for modelling multivariate spatial‐temporal data
Abstract In the new era of big data, modelling multivariate spatial‐temporal data is a challenging task due to both the high dimensionality of the features and complex associations among the responses across different locations and time points.
Reisa Widjaja +3 more
wiley +1 more source

