Results 21 to 30 of about 2,122,188 (202)

Lossless Image Steganography Based on Invertible Neural Networks

open access: yesEntropy, 2022
Image steganography is a scheme that hides secret information in a cover image without being perceived. Most of the existing steganography methods are more concerned about the visual similarity between the stego image and the cover image, and they ignore
Lianshan Liu, Li Tang, Weimin Zheng
doaj   +1 more source

Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares

open access: yesMathematics, 2020
A Multi Secret Image sharing scheme can share several secret images among certain participators securely. Boolean-based secret sharing schemes are one kind of secret sharing method with light-weighted computation compared to the previous complex ...
Hongliang Cai, Dan Tang
doaj   +1 more source

A Secret Image Sharing Based on Logistic-Chebyshev Chaotic Map and Chinese Remainder Theorem [PDF]

open access: yesComputer Science Journal of Moldova, 2023
Visual secret sharing (VSS) was introduced in order to solve information security issues. It is a modern cryptographic technique. It involves breaking up a secret image into $n$ secured components known as shares.
Asmaa Hilmi   +2 more
doaj   +1 more source

Secret Image Sharing with Dealer-Participatory and Non-Dealer-Participatory Mutual Shadow Authentication Capabilities

open access: yesMathematics, 2020
A ( k , n ) threshold secret image sharing (SIS) method is proposed to divide a secret image into n shadows. The beauty of this scheme is that one can only reconstruct a secret image with k or more than k shadows, but one cannot obtain any ...
Yue Jiang   +4 more
doaj   +1 more source

Lossless and Efficient Secret Image Sharing Based on Matrix Theory Modulo 256

open access: yesMathematics, 2020
Most of today’s secret image sharing (SIS) schemes are based on Shamir’s polynomial-based secret sharing (SS), which cannot recover pixels larger than 250. Many exiting methods of lossless recovery are not perfect, because several problems arise, such as
Long Yu   +4 more
doaj   +1 more source

A Novel Lossless Medical Image Encryption Scheme Based on Game Theory With Optimized ROI Parameters and Hidden ROI Position

open access: yesIEEE Access, 2020
Medical images contain a large amount of patients' private information. The theft and destruction of medical images will cause irreparable losses to patients and medical institutions.
Jian Zhou, Jinqing Li, Xiaoqiang Di
doaj   +1 more source

A New Scheme for Lossless Meaningful Visual Secret Sharing by using XOR Properties [PDF]

open access: yesJournal of Artificial Intelligence and Data Mining, 2023
In this paper, a novel scheme for lossless meaningful visual secret sharing using XOR properties is presented. In the first step, genetic algorithm with an appropriate proposed objective function created noisy share images.
Z. Mehrnahad   +2 more
doaj   +1 more source

A contrast-sensitive reversible visible image watermarking technique [PDF]

open access: yes, 2009
A reversible (also called lossless, distortion-free, or invertible) visible watermarking scheme is proposed to satisfy the applications, in which the visible watermark is expected to combat copyright piracy but can be removed to losslessly recover the ...
Li, Chang-Tsun   +4 more
core   +1 more source

Nearly Optimal Deterministic Algorithm for Sparse Walsh-Hadamard Transform [PDF]

open access: yes, 2015
For every fixed constant $\alpha > 0$, we design an algorithm for computing the $k$-sparse Walsh-Hadamard transform of an $N$-dimensional vector $x \in \mathbb{R}^N$ in time $k^{1+\alpha} (\log N)^{O(1)}$.
Cheraghchi, Mahdi, Indyk, Piotr
core   +3 more sources

Lossless $(k,n)$ -Threshold Image Secret Sharing Based on the Chinese Remainder Theorem Without Auxiliary Encryption

open access: yesIEEE Access, 2019
A typical Chinese remainder theorem (CRT)-based secret sharing (SS) scheme has been proposed by Asmuth and Bloom for several decades, with lower computation complexity compared to Shamir's original polynomial-based SS.
Longlong Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy