Results 1 to 10 of about 107,797 (245)

Meaningful Secret Image Sharing with Saliency Detection

open access: yesEntropy, 2022
Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed cloud storage.
Jingwen Cheng   +4 more
doaj   +3 more sources

General Meaningful Shadow Construction in Secret Image Sharing

open access: yesIEEE Access, 2018
Secret image sharing (SIS) is an important technique for image protection. Several shadows are produced in SIS through scrambling pixel values and their correlations of a secret image.
Xuehu Yan, Yuliang Lu, Lintao Liu
doaj   +2 more sources

Meaningful Secret Image Sharing with Uniform Image Quality

open access: yesMathematics, 2022
In meaningful secret image sharing (MSIS), a secret image is divided into n shadows. Each shadow is meaningful and similar to the corresponding cover image.
Jingwen Cheng   +3 more
doaj   +3 more sources

A reversible and lossless secret image sharing scheme with authentication for color images

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
With the increasing concern for public privacy protection, Secret Image Sharing (SIS) has garnered significant attention among researchers. The goal of SIS is to split a secret image into multiple shadows, rendering it unrecoverable unless a specific ...
Wendan Li   +4 more
doaj   +1 more source

Thumbnail Secret Image Sharing in Cloud Storage

open access: yesMathematics, 2022
In recent years, the amount of data has increased explosively, which has spawned the large-scale development of cloud storage. Increasingly, individuals and enterprises store images in cloud space.
Yongqiang Yu   +4 more
doaj   +1 more source

COMPARISON OF UNSUPERVISED VEGETATION CLASSIFICATION METHODS FROM VHR IMAGES AFTER SHADOWS REMOVAL BY INNOVATIVE ALGORITHMS [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2015
The recognition of vegetation by the analysis of very high resolution (VHR) aerial images provides meaningful information about environmental features; nevertheless, VHR images frequently contain shadows that generate significant problems for the ...
A. Movia, A. Beinat, F. Crosilla
doaj   +1 more source

A k,n-Threshold Secret Image Sharing Scheme Based on a Non-Full Rank Linear Model

open access: yesMathematics, 2022
Secret image sharing is a hot issue in the research field of data hiding schemes for digital images. This paper proposes a general k,n threshold secret image sharing scheme, which distributes secret data into n meaningful image shadows based on a non ...
Ji-Hwei Horng   +2 more
doaj   +1 more source

A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix

open access: yesIEEE Access, 2020
This paper first proposes a generation algorithm of a stick insect matrix. Then, a novel reversible secret image sharing scheme based on the stick insect matrix is presented.
Kai Gao   +3 more
doaj   +1 more source

Cometary topography and phase darkening [PDF]

open access: yes, 2019
Cometary surfaces can change significantly and rapidly due to the sublimation of their volatile material. Many authors have investigated this evolution; Vincent et al.
Vincent, Jean-Baptiste
core   +2 more sources

Anticipating EGFR Targeting in Early Stages of Lung Cancer: Leave No Stone Unturned

open access: yesCells, 2021
Background: The current treatment landscape of early stage lung cancer is rapidly evolving, particularly in EGFR mutant non-small cell lung cancer (NSCLC), where target therapy is moving to early stages.
Lorenzo Belluomini   +15 more
doaj   +1 more source

Home - About - Disclaimer - Privacy