Results 221 to 230 of about 107,797 (245)

Opening the black box: explainable AI for automated bioturbation analysis in cores and outcrops. [PDF]

open access: yesSci Rep
Ayranci K   +4 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Quadri-directional searching algorithm for secret image sharing using meaningful shadows

Journal of Visual Communication and Image Representation, 2015
A low computational complexity for secret image sharing.High quality of generated shares.No secret information is leaked from shares, thus it guarantees high security.Satisfy four criteria: security, accuracy, computational complexity, shadow size. Contrary to conventional protecting data such as cryptographic techniques which encrypt the data with a ...
Ngoc-Tu Huynh   +2 more
openaire   +3 more sources

Secret sharing: using meaningful image shadows based on Gray code

Multimedia Tools and Applications, 2016
Steganography, such as secret sharing, is an important technique to use for protecting transmitted confidential data from the attention of any adversaries. Gray code is a commonly encountered binary labeling that was proposed by Frank Gray of Bell Laboratories in 1940 to prevent errors when using pulse-code modulation to transmit signals.
Ting-Fang Cheng   +2 more
openaire   +3 more sources

Adaptive image sharing based on the quadri-directional search strategy with meaningful shadows

Multimedia Tools and Applications, 2016
Image sharing is a technique that is used to protect the security of a secret image by placing it into shadows. In this paper, we propose a new image sharing scheme based on the quadri-directional search strategy with meaningful shadows. In the proposed scheme, a modulus reference table is generated and used to share different sizes of the secret image.
Thai-Son Nguyen   +2 more
openaire   +3 more sources

Implementation of TiOISSS with meaningful shadows and with an additional authentication image

Journal of Visual Communication and Image Representation, 2016
The proposed scheme implements TiOISSS with meaningful shadows.The proposed scheme uses additional authentication image, to enhance the security.Adaptive halftoning is used to improve the quality of decoded secret image.The proposed scheme demonstrates better quality and security.
S. Srividhya   +2 more
openaire   +3 more sources

Meaningful secret image sharing resist to typical image processing of shadows

Multimedia Tools and Applications, 2022
Yue Jiang   +4 more
openaire   +3 more sources

Invertible secret sharing: Using meaningful shadows based on Sorted Indexed Code

Optik, 2020
Abstract The need for secret sharing using meaningful shadow images is an important method to protect the transmitted data that does not attract the attention of adversary, which has become obvious in the past few years. The recovery of the cover image without any distortion and security of the embedded secret string efficiently needs to be addressed.
Shailendra Kumar Tripathi   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy