A Lossless-Recovery Secret Distribution Scheme Based on QR Codes [PDF]
The visual cryptography scheme (VCS) distributes a secret to several images that can enhance the secure transmission of that secret. Quick response (QR) codes are widespread. VCS can be used to improve their secure transmission.
Jeng-Shyang Pan +4 more
doaj +5 more sources
Medical images lossless recovery based on POB number system and image compression. [PDF]
To protect the information integrity of the medical images, this paper proposes a secure lossless recovery scheme for medical images based on image block compression and permutation ordered binary (POB) number system, which includes two parts: share ...
Li Q, Fu Y, Zhang Z, Fofanah AJ, Gao T.
europepmc +7 more sources
Robust optical multi-image encryption with lossless decryption Recovery Based on phase recombination and vector decomposition [PDF]
Summary: Image encryption is crucial for protecting image privacy and ensuring security. Encrypting large batches of images of different types and sizes simultaneously with losslessly decryption is often necessary.
Yuan Guo +3 more
doaj +5 more sources
Lossless Compression and Linear Recovery of a System Matrix Based on a Polar Adaptive Pixel
The nondestructive characteristics of $\gamma $ -photon imaging technology make it attractive potential in the industry. However, in industrial detection with a large detection range and high resolution, iteration method, the image reconstruction ...
Shuyi Chen +4 more
doaj +3 more sources
Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. [PDF]
Tamper localization and recovery watermarking scheme can be used to detect manipulation and recover tampered images. In this paper, a tamper localization and lossless recovery scheme that used region of interest (ROI) segmentation and multilevel authentication was proposed. The watermarked images had a high average peak signal-to-noise ratio of 48.7 dB
Liew SC, Liew SW, Zain JM, Zain JM.
europepmc +5 more sources
Weighted Polynomial-Based Secret Image Sharing Scheme with Lossless Recovery [PDF]
In some particular scenes, the shadows need to be given different weights to represent the participants’ status or importance. And during the reconstruction, participants with different weights obtain various quality reconstructed images.
Yongjie Wang +4 more
semanticscholar +2 more sources
Weighted visual secret sharing with multiple decryptions and lossless recovery.
Traditional visual secret sharing (VSS) encodes the original secret image into n shares, and each share is of equal importance. However, in some scenarios, we need to make a difference between the participants according to the levels of their importance.
Feng Liu, Xuehu Yan, Y. Lu, Longdan Tan
semanticscholar +5 more sources
An Enhance Scheme of Visual Secret Share for Lossless Recovery
Algorithms in Visual Cryptography usually uses a sharing scheme where instead of sharing the secret or message directly, it is embedded into multiple shares which are then shared between the intended individuals whereby upon receiving them the decrypting
Kalyan Das +4 more
semanticscholar +2 more sources
Universal Compressed Sensing for Almost Lossless Recovery
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
S. Jalali, H. Poor
semanticscholar +3 more sources
Hopf-Hopf bifurcation analysis and chaotic delayed-DNA audio encryption using cubic nonlinear optoelectronic oscillator [PDF]
The study presents a hybrid model for encryption which is based on the utilization of nonlinear chaotic behaviors in a cubic optoelectronic oscillator (OEO) as well as biomimetic DNA computation to achieve secure and lossless protection of audio data ...
Muhammad Aiyaz +6 more
doaj +2 more sources

