Results 11 to 20 of about 13,384 (274)

Boolean-Based (k, n, m) Multi-Secret Image Sharing

open access: yesAxioms, 2022
Multi-secret image sharing technology shares multiple secret images among shared images for participants and the recovery requires enough shared images for fulfilling the security property.
Chien-Chang Chen   +2 more
doaj   +1 more source

Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm

open access: yesEntropy, 2023
Reversible Data Hiding in Encrypted Image (RDHEI) is a technology for embedding secret information in an encrypted image. It allows the extraction of secret information and lossless decryption and the reconstruction of the original image.
Chi-Yao Weng, Cheng-Hsing Yang
doaj   +1 more source

Multi-Secret Sharing Schemes [PDF]

open access: yes, 1994
A multi-secret sharing scheme is a protocol to share m arbitrarily related secrets s1,..., sm among a set of participants P. In this paper we put forward a general theory of multi-secret sharing schemes by using an information theoretical framework. We prove lower bounds on the size of information held by each participant for various access structures.
Carlo Blundo   +4 more
openaire   +1 more source

Secure secret sharing in the cloud [PDF]

open access: yes, 2017
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets.
Chang, Ching-Chun, Li, Chang-Tsun
core   +1 more source

Data Hiding of Multicompressed Images Based on Shamir Threshold Sharing

open access: yesApplied Sciences, 2022
Image-based data hiding methods have been used in the development of various applications in computer vision. At present, there are two main types of data hiding based on secret sharing, namely dual-image data hiding and multi-image data hiding.
Haoyang Kang, Lu Leng, Byung-Gyu Kim
doaj   +1 more source

New results and applications for multi-secret sharing schemes [PDF]

open access: yes, 2014
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some set , each one according to an access structure. The trivial solution to this problem is to run independent instances of a standard secret sharing scheme,
Herranz Sotoca, Javier   +2 more
core   +2 more sources

Privacy-Preserving Determination of Secret Interval and Threshold

open access: yesJisuanji kexue yu tansuo, 2020
Secure multi-party computation (SMC) is a research hotspot in cryptography in recent years, and is also a key technology for information security protection.
CHENG Wen, LI Shundong, WANG Wenli
doaj   +1 more source

Multi-Hider Reversible Data Hiding Using a Weighted Color Transfer and Modulus Operation

open access: yesApplied Sciences, 2023
This paper proposes a multi-hider dual-image reversible data-hiding algorithm. Generating dual stego images, the proposed algorithm provides a high embedding capacity, exhibits high image quality, offers reversibility to restore the stego images, and ...
Ku-Sung Hsieh, Chung-Ming Wang
doaj   +1 more source

Efficient Multi-Secret Digital Images Steganography [PDF]

open access: yesJournal of Computer Science, 2020
The new conceptions of more than one secret message and false digital image steganography are presented in the current paper. One of the major ideas in these approaches is embodiment of more than one message in one container (digital image). The secrets that are hidden are known as real and false messages. The former one includes basic data that should
openaire   +1 more source

Cryptographic techniques used to provide integrity of digital content in long-term storage [PDF]

open access: yes, 2011
The main objective of the project was to obtain advanced mathematical methods to guarantee the verification that a required level of data integrity is maintained in long-term storage.
John, Ockendon   +9 more
core   +1 more source

Home - About - Disclaimer - Privacy