Results 241 to 250 of about 13,384 (274)
Some of the next articles are maybe not open access.
Key Generation for Multi-Secret Steganography
2015 2nd International Conference on Information Science and Security (ICISS), 2015This article presents a method of steganographic keys generation for case of embedding many secrets in single container. The most important requirements of proposed algorithm are as follows. The generated keys cannot overlap what means that the positions they indicate in the cover have to be different.
Katarzyna Koptyra, Marek R. Ogiela
openaire +1 more source
A Threshold Multi-secret Sharing Scheme
2008 IEEE International Conference on Networking, Sensing and Control, 2008This paper proposes a threshold multi-secret sharing scheme. In such a scheme, many secrets are shared in such a way that all secrets can be reconstructed independently without refreshing the shares. Every share is of the same size as that of any single shared secret in the proposed scheme.
Shi Runhua +3 more
openaire +1 more source
Linear multi-secret sharing schemes
Science in China Series F, 2005In this paper the linear multi-secret sharing schemes are studied by using monotone span programs. A relation between computing monotone Boolean functions by using monotone span programs and realizing multi-access structures by using linear multi-secret sharing schemes is shown.
openaire +1 more source
Sharing visual multi-secrets using circle shares
Computer Standards & Interfaces, 2005Traditional visual cryptography technique has provided sufficient security to fulfill the purpose of protecting confidential messages. In current technology, the same set of shares can be embedded with many sets of secret messages after one of the shares is rotated at different degrees.
Hsien-Chu Wu, Chin-Chen Chang
openaire +1 more source
Advanced fault-tolerant visual multi-secret sharing scheme
Journal of Surveillance, Security and Safety, 2022Aim: In visual cryptography, a secret image is encrypted into two meaningless random images called shares. These two shares can be stacked to recover the secret image without any calculations. However, because of the alignment problem in the decryption phase, risk of poor quality of the restored image exists.
Justie Su-Tzu Juan +3 more
openaire +1 more source
Embedding Strategies in Multi-secret Steganography
2017This paper discusses the different embedding strategies in multi-secret steganography. Each secret is related to one selected embedding procedure, which may depend or not on personal features or characteristics. Such multi-way embedding approach allows to reveal secrets independently of each other.
Katarzyna Koptyra, Marek R. Ogiela
openaire +1 more source
A general multi-secret visual cryptography scheme
Optics Communications, 2010Abstract In a ( k , n ) visual cryptography scheme (VCS), a secret image is encoded into n shadow images that are distributed to n participants. Any k participants can reveal the secret image by stacking their shadow images, and less than k participants have no information about the secret image.
Ching-Nung Yang, Ting-Hao Chung
openaire +1 more source
Multi-secret visual cryptography with deterministic contrast
Multimedia Tools and Applications, 2013The multi-secret visual cryptography scheme (MVCS) allows for the encryption of multiple secret images into a given image area. The previous works on MVCS with probabilistic contrast can not guarantee that every original pixel will be reconstructed correctly.
Bin Yu, Gang Shen
openaire +1 more source
Verifiable Rational Multi-secret Sharing Scheme
2011In this paper we mainly focus on the cheating problem and the incapability problem existed in rational secret sharing schemes. Based on current schemes and the related knowledge of bit commitment agreement, we proposed a verifiable rational multi-secret sharing scheme in which players can verify the identity of the dealer.
Yongquan Cai, Zhanhai Luo, Yi Yang
openaire +1 more source
A scheme for threshold multi-secret sharing
Applied Mathematics and Computation, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chan, Chao-Wen, Chang, Chin-Chen
openaire +1 more source

