Results 1 to 10 of about 2,122,188 (202)

A Lossless-Recovery Secret Distribution Scheme Based on QR Codes [PDF]

open access: yesEntropy, 2023
The visual cryptography scheme (VCS) distributes a secret to several images that can enhance the secure transmission of that secret. Quick response (QR) codes are widespread. VCS can be used to improve their secure transmission.
Jeng-Shyang Pan   +4 more
doaj   +5 more sources

Medical images lossless recovery based on POB number system and image compression. [PDF]

open access: yesMultimed Tools Appl, 2022
To protect the information integrity of the medical images, this paper proposes a secure lossless recovery scheme for medical images based on image block compression and permutation ordered binary (POB) number system, which includes two parts: share ...
Li Q, Fu Y, Zhang Z, Fofanah AJ, Gao T.
europepmc   +7 more sources

Robust optical multi-image encryption with lossless decryption Recovery Based on phase recombination and vector decomposition [PDF]

open access: yesiScience
Summary: Image encryption is crucial for protecting image privacy and ensuring security. Encrypting large batches of images of different types and sizes simultaneously with losslessly decryption is often necessary.
Yuan Guo   +3 more
doaj   +5 more sources

Lossless Compression and Linear Recovery of a System Matrix Based on a Polar Adaptive Pixel

open access: yesIEEE Access, 2023
The nondestructive characteristics of $\gamma $ -photon imaging technology make it attractive potential in the industry. However, in industrial detection with a large detection range and high resolution, iteration method, the image reconstruction ...
Shuyi Chen   +4 more
doaj   +3 more sources

Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. [PDF]

open access: yesJ Digit Imaging, 2013
Tamper localization and recovery watermarking scheme can be used to detect manipulation and recover tampered images. In this paper, a tamper localization and lossless recovery scheme that used region of interest (ROI) segmentation and multilevel authentication was proposed. The watermarked images had a high average peak signal-to-noise ratio of 48.7 dB
Liew SC, Liew SW, Zain JM, Zain JM.
europepmc   +5 more sources

Weighted Polynomial-Based Secret Image Sharing Scheme with Lossless Recovery [PDF]

open access: yesSecurity and Communication Networks, 2021
In some particular scenes, the shadows need to be given different weights to represent the participants’ status or importance. And during the reconstruction, participants with different weights obtain various quality reconstructed images.
Yongjie Wang   +4 more
semanticscholar   +2 more sources

Weighted visual secret sharing with multiple decryptions and lossless recovery.

open access: yesMathematical Biosciences and Engineering, 2019
Traditional visual secret sharing (VSS) encodes the original secret image into n shares, and each share is of equal importance. However, in some scenarios, we need to make a difference between the participants according to the levels of their importance.
Feng Liu, Xuehu Yan, Y. Lu, Longdan Tan
semanticscholar   +5 more sources

An Enhance Scheme of Visual Secret Share for Lossless Recovery

open access: yesInternational Journal of Engineering and Advanced Technology, 2020
Algorithms in Visual Cryptography usually uses a sharing scheme where instead of sharing the secret or message directly, it is embedded into multiple shares which are then shared between the intended individuals whereby upon receiving them the decrypting
Kalyan Das   +4 more
semanticscholar   +2 more sources

Universal Compressed Sensing for Almost Lossless Recovery

open access: yesIEEE Transactions on Information Theory, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
S. Jalali, H. Poor
semanticscholar   +3 more sources

Hopf-Hopf bifurcation analysis and chaotic delayed-DNA audio encryption using cubic nonlinear optoelectronic oscillator [PDF]

open access: yesScientific Reports
The study presents a hybrid model for encryption which is based on the utilization of nonlinear chaotic behaviors in a cubic optoelectronic oscillator (OEO) as well as biomimetic DNA computation to achieve secure and lossless protection of audio data ...
Muhammad Aiyaz   +6 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy