Results 1 to 10 of about 107,797 (245)
Meaningful Secret Image Sharing with Saliency Detection
Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed cloud storage.
Jingwen Cheng +4 more
doaj +3 more sources
General Meaningful Shadow Construction in Secret Image Sharing
Secret image sharing (SIS) is an important technique for image protection. Several shadows are produced in SIS through scrambling pixel values and their correlations of a secret image.
Xuehu Yan, Yuliang Lu, Lintao Liu
doaj +2 more sources
Meaningful Secret Image Sharing with Uniform Image Quality
In meaningful secret image sharing (MSIS), a secret image is divided into n shadows. Each shadow is meaningful and similar to the corresponding cover image.
Jingwen Cheng +3 more
doaj +3 more sources
A reversible and lossless secret image sharing scheme with authentication for color images
With the increasing concern for public privacy protection, Secret Image Sharing (SIS) has garnered significant attention among researchers. The goal of SIS is to split a secret image into multiple shadows, rendering it unrecoverable unless a specific ...
Wendan Li +4 more
doaj +1 more source
Thumbnail Secret Image Sharing in Cloud Storage
In recent years, the amount of data has increased explosively, which has spawned the large-scale development of cloud storage. Increasingly, individuals and enterprises store images in cloud space.
Yongqiang Yu +4 more
doaj +1 more source
COMPARISON OF UNSUPERVISED VEGETATION CLASSIFICATION METHODS FROM VHR IMAGES AFTER SHADOWS REMOVAL BY INNOVATIVE ALGORITHMS [PDF]
The recognition of vegetation by the analysis of very high resolution (VHR) aerial images provides meaningful information about environmental features; nevertheless, VHR images frequently contain shadows that generate significant problems for the ...
A. Movia, A. Beinat, F. Crosilla
doaj +1 more source
A
Secret image sharing is a hot issue in the research field of data hiding schemes for digital images. This paper proposes a general k,n threshold secret image sharing scheme, which distributes secret data into n meaningful image shadows based on a non ...
Ji-Hwei Horng +2 more
doaj +1 more source
A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix
This paper first proposes a generation algorithm of a stick insect matrix. Then, a novel reversible secret image sharing scheme based on the stick insect matrix is presented.
Kai Gao +3 more
doaj +1 more source
Cometary topography and phase darkening [PDF]
Cometary surfaces can change significantly and rapidly due to the sublimation of their volatile material. Many authors have investigated this evolution; Vincent et al.
Vincent, Jean-Baptiste
core +2 more sources
Anticipating EGFR Targeting in Early Stages of Lung Cancer: Leave No Stone Unturned
Background: The current treatment landscape of early stage lung cancer is rapidly evolving, particularly in EGFR mutant non-small cell lung cancer (NSCLC), where target therapy is moving to early stages.
Lorenzo Belluomini +15 more
doaj +1 more source

