Results 151 to 160 of about 2,122,188 (202)
Some of the next articles are maybe not open access.
A novel mapping-based lossless recovery algorithm for VSS
Journal of Real-Time Image Processing, 2016The disadvantages of the existing lossless recovery algorithms in visual secret sharing (VSS) are that n shadow images or complex computation operation (i.e., Lagrange interpolations) is required in the recovering phase. Inspired by this, a novel mapping-based lossless recovery algorithm (MbLRA) for VSS is proposed in this paper. MbLRA at least has two
Xin Liu +3 more
semanticscholar +5 more sources
A novel lossless recovery algorithm for basic matrix-based VSS
Multimedia Tools and Applications, 2017Lossless recovery is very important for visual secret share (VSS). In this paper, a novel lossless recovery algorithm for the basic matrix-based VSS is proposed. The algorithm has the merit of reconstructing secret image losslessly by using simple addition operation. The algorithm proves that the condition of lossless recovery of the secret image is ΞΎ0
Xin Liu +3 more
semanticscholar +4 more sources
Secret image sharing scheme with lossless recovery and high efficiency
Signal Processing, 2023Shengyang Luo +3 more
semanticscholar +4 more sources
Lossless image hierarchical recovery based on POB number system
Signal Processing, 2020This paper proposes an effective method for image tampering localization and recovery. In the proposed scheme, the host image is firstly encrypted by a chaotic system, and then bit-plane separation is conducted on the encrypted image.
Yan Liu, Zhaoning You, Tiegang Gao
semanticscholar +4 more sources
Cropping Resilient Secret Image Sharing Scheme with Lossless Recovery
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023In recent years, secret image sharing (SIS) has attracted extensive attention in the academic community due to its advantages of loss tolerance and low computational complexity. To enhance the robustness of SIS system, it is vital to study SIS technology
Shengyang Luo +3 more
semanticscholar +2 more sources
Multi-image based self-embedding watermarking with lossless tampering recovery capability
Expert Systems with ApplicationsFang Cao +3 more
semanticscholar +4 more sources
A lossless self-recovery watermarking scheme with JPEG-LS compression
Journal of Information Security and Applications, 2021Abstract Due to the rapid development of application for medical images in recent years, the security of medical images becomes more vital. In this paper, a fragile watermarking scheme for medical images is proposed. The proposed scheme first divides the whole medical image into ROI (Regions of Interest) and RONI (Regions of Non-interest).
Zhaoning You, Yan Liu, Tiegang Gao
semanticscholar +3 more sources
FreeLauncher: Lossless Failure Recovery of Parameter Servers with Ultralight Replication
2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS), 2021Modern distributed machine learning (ML) systems leverage large-scale computing infrastructures to achieve fast model training. For many servers jointly training a model, failure recovery becomes an important challenge when a training task could be ...
Yangyang Zhang +4 more
semanticscholar +2 more sources
Self-embedding watermarking for ciphertext images with lossless recovery capability
Proceedings of the 2024 7th International Conference on Artificial Intelligence and Pattern RecognitionNowadays, image encryption and secret sharing are commonly combined to protect the private information of images and to gain disaster-tolerance. However, encrypted images are also susceptible to tampering when transmitted over insecure channels, and ...
Haowei Ye +4 more
semanticscholar +2 more sources

