Results 11 to 20 of about 13,384 (274)
Boolean-Based (k, n, m) Multi-Secret Image Sharing
Multi-secret image sharing technology shares multiple secret images among shared images for participants and the recovery requires enough shared images for fulfilling the security property.
Chien-Chang Chen +2 more
doaj +1 more source
Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm
Reversible Data Hiding in Encrypted Image (RDHEI) is a technology for embedding secret information in an encrypted image. It allows the extraction of secret information and lossless decryption and the reconstruction of the original image.
Chi-Yao Weng, Cheng-Hsing Yang
doaj +1 more source
Multi-Secret Sharing Schemes [PDF]
A multi-secret sharing scheme is a protocol to share m arbitrarily related secrets s1,..., sm among a set of participants P. In this paper we put forward a general theory of multi-secret sharing schemes by using an information theoretical framework. We prove lower bounds on the size of information held by each participant for various access structures.
Carlo Blundo +4 more
openaire +1 more source
Secure secret sharing in the cloud [PDF]
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets.
Chang, Ching-Chun, Li, Chang-Tsun
core +1 more source
Data Hiding of Multicompressed Images Based on Shamir Threshold Sharing
Image-based data hiding methods have been used in the development of various applications in computer vision. At present, there are two main types of data hiding based on secret sharing, namely dual-image data hiding and multi-image data hiding.
Haoyang Kang, Lu Leng, Byung-Gyu Kim
doaj +1 more source
New results and applications for multi-secret sharing schemes [PDF]
In a multi-secret sharing scheme (MSSS), different secrets are distributed among the players in some set , each one according to an access structure. The trivial solution to this problem is to run independent instances of a standard secret sharing scheme,
Herranz Sotoca, Javier +2 more
core +2 more sources
Privacy-Preserving Determination of Secret Interval and Threshold
Secure multi-party computation (SMC) is a research hotspot in cryptography in recent years, and is also a key technology for information security protection.
CHENG Wen, LI Shundong, WANG Wenli
doaj +1 more source
Multi-Hider Reversible Data Hiding Using a Weighted Color Transfer and Modulus Operation
This paper proposes a multi-hider dual-image reversible data-hiding algorithm. Generating dual stego images, the proposed algorithm provides a high embedding capacity, exhibits high image quality, offers reversibility to restore the stego images, and ...
Ku-Sung Hsieh, Chung-Ming Wang
doaj +1 more source
Efficient Multi-Secret Digital Images Steganography [PDF]
The new conceptions of more than one secret message and false digital image steganography are presented in the current paper. One of the major ideas in these approaches is embodiment of more than one message in one container (digital image). The secrets that are hidden are known as real and false messages. The former one includes basic data that should
openaire +1 more source
Cryptographic techniques used to provide integrity of digital content in long-term storage [PDF]
The main objective of the project was to obtain advanced mathematical methods to guarantee the verification that a required level of data integrity is maintained in long-term storage.
John, Ockendon +9 more
core +1 more source

