Results 241 to 250 of about 13,384 (274)
Some of the next articles are maybe not open access.

Key Generation for Multi-Secret Steganography

2015 2nd International Conference on Information Science and Security (ICISS), 2015
This article presents a method of steganographic keys generation for case of embedding many secrets in single container. The most important requirements of proposed algorithm are as follows. The generated keys cannot overlap what means that the positions they indicate in the cover have to be different.
Katarzyna Koptyra, Marek R. Ogiela
openaire   +1 more source

A Threshold Multi-secret Sharing Scheme

2008 IEEE International Conference on Networking, Sensing and Control, 2008
This paper proposes a threshold multi-secret sharing scheme. In such a scheme, many secrets are shared in such a way that all secrets can be reconstructed independently without refreshing the shares. Every share is of the same size as that of any single shared secret in the proposed scheme.
Shi Runhua   +3 more
openaire   +1 more source

Linear multi-secret sharing schemes

Science in China Series F, 2005
In this paper the linear multi-secret sharing schemes are studied by using monotone span programs. A relation between computing monotone Boolean functions by using monotone span programs and realizing multi-access structures by using linear multi-secret sharing schemes is shown.
openaire   +1 more source

Sharing visual multi-secrets using circle shares

Computer Standards & Interfaces, 2005
Traditional visual cryptography technique has provided sufficient security to fulfill the purpose of protecting confidential messages. In current technology, the same set of shares can be embedded with many sets of secret messages after one of the shares is rotated at different degrees.
Hsien-Chu Wu, Chin-Chen Chang
openaire   +1 more source

Advanced fault-tolerant visual multi-secret sharing scheme

Journal of Surveillance, Security and Safety, 2022
Aim: In visual cryptography, a secret image is encrypted into two meaningless random images called shares. These two shares can be stacked to recover the secret image without any calculations. However, because of the alignment problem in the decryption phase, risk of poor quality of the restored image exists.
Justie Su-Tzu Juan   +3 more
openaire   +1 more source

Embedding Strategies in Multi-secret Steganography

2017
This paper discusses the different embedding strategies in multi-secret steganography. Each secret is related to one selected embedding procedure, which may depend or not on personal features or characteristics. Such multi-way embedding approach allows to reveal secrets independently of each other.
Katarzyna Koptyra, Marek R. Ogiela
openaire   +1 more source

A general multi-secret visual cryptography scheme

Optics Communications, 2010
Abstract In a ( k , n ) visual cryptography scheme (VCS), a secret image is encoded into n shadow images that are distributed to n participants. Any k participants can reveal the secret image by stacking their shadow images, and less than k participants have no information about the secret image.
Ching-Nung Yang, Ting-Hao Chung
openaire   +1 more source

Multi-secret visual cryptography with deterministic contrast

Multimedia Tools and Applications, 2013
The multi-secret visual cryptography scheme (MVCS) allows for the encryption of multiple secret images into a given image area. The previous works on MVCS with probabilistic contrast can not guarantee that every original pixel will be reconstructed correctly.
Bin Yu, Gang Shen
openaire   +1 more source

Verifiable Rational Multi-secret Sharing Scheme

2011
In this paper we mainly focus on the cheating problem and the incapability problem existed in rational secret sharing schemes. Based on current schemes and the related knowledge of bit commitment agreement, we proposed a verifiable rational multi-secret sharing scheme in which players can verify the identity of the dealer.
Yongquan Cai, Zhanhai Luo, Yi Yang
openaire   +1 more source

A scheme for threshold multi-secret sharing

Applied Mathematics and Computation, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chan, Chao-Wen, Chang, Chin-Chen
openaire   +1 more source

Home - About - Disclaimer - Privacy