Results 11 to 20 of about 1,949,204 (276)
XOR-Based (n, n) Visual Cryptography Schemes for Grayscale or Color Images with Meaningful Shares
XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle of XOR-based VCS is to encrypt a secret image into several encrypted images, called shares.
Yu-Hong Chen, Justie Su-Tzu Juan
doaj +1 more source
Pixel grafting: A novel skin graft expansion technique
Skin grafting is the transplantation of skin, a routinely performed procedure to cover the loss of skin. Skin is the largest organ of the body, which falls short of availability in extensive injuries, especially burns. In such a situation, pixel grafting, a novel expansion technique helps to cover a large area with less skin harvest.
Chavan, Vinayak +7 more
openaire +2 more sources
Pixel-level detection of expansion joints on complex pavements is significant for traffic safety and the structural integrity of highway bridges. This paper proposed an improved HRNet-OCR, named as expansion joints segmentation network (EJSNet), for ...
Anzheng He +7 more
semanticscholar +1 more source
Visual cryptography scheme on graphs with $m^{*}(G)=4$ [PDF]
Let $G=(V,E)$ be a connected graph and $\Gamma (G)$ be the strong access structure where obtained from graph $G$. A visual cryptography scheme (VCS) for a set $P$ of participants is a method to encode a secret image such that any pixel of this image ...
Mahmood Davarzani
doaj +1 more source
Analysis and design of visual secret sharing scheme for gray image
Existing gray visual secret sharing (GVSS) convert the original image into black-white binary image for processing,which causes the pixel information loss problem.For this purpose,a kind of GVSS based on gray superposition was proposed.For each gray ...
Jian LIU, Yi ZHANG, Yuling LIU, Hao HU
doaj +3 more sources
A Novel Steganography-Based Pattern for Print Matter Anti-Counterfeiting by Smartphone Cameras
Print matter authentication based on anti-counterfeiting techniques has received continuously increasing concern from academia and industry. However, the existing printing anti-counterfeiting solutions often have the defects of poor identification ...
Hong Zheng +4 more
doaj +1 more source
Much environmental enforcement in the United States has historically relied on either self-reported data or physical, resource-intensive, infrequent inspections.
Ben Chugg +4 more
doaj +1 more source
An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms
This article proposes an efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms, which includes an encryption and a decryption schemes for gray-scale and color secret images.
Huan Wang +3 more
doaj +1 more source
Reversible Data Hiding Based on Pixel-Value-Ordering and Prediction-Error Triplet Expansion
Pixel value ordering and prediction error expansion (PVO+PEE) is a very successful reversible data hiding (RDH) scheme. A series of studies were proposed to improve the performance of the PVO-based scheme. However, the embedding capacity of those schemes
Heng-Xiao Chi +2 more
doaj +1 more source
A New Bi-Level Encoding and Decoding Scheme for Pixel Expansion Based Visual Cryptography
Mapping of image-based object textures to ASCII characters can be a new modification towards visual cryptography. Naor and Shamir proposed a new dimension of Information security as visual cryptography which is a secret sharing scheme among N number of ...
R. C. Barik, S. Changder, S. Sahu
semanticscholar +1 more source

