Results 201 to 210 of about 1,949,204 (276)

Computational Analysis of Intravascular OCT Images for Future Clinical Support: A Comprehensive Review. [PDF]

open access: yesIEEE Rev Biomed Eng
Lee J   +10 more
europepmc   +1 more source

Visual Secret Sharing Without Pixel Expansion

International Journal of Digital Crime and Forensics, 2015
Visual Secret Sharing (VSS) is a powerful approach for protecting image sharing through unsecured computer network such as the Internet. Pixel expansion and bad image quality are the most common problems of this approach. Visual secret sharing technique is proposed for grayscale images to eliminate pixel expansion problem using image compression.
Ali Makki Sagheer, Laith Hamid Abed
openaire   +2 more sources

Optimal pixel expansion of deterministic visual cryptography scheme

Multimedia Tools and Applications, 2013
The optimal pixel expansion is an important parameter of deterministic visual cryptography scheme (DVCS). There are many researches have been done under different access structures and stacking operations. However, any necessary or sufficient condition has not been found about the optimal pixel expansion. In this paper, we give a necessary condition of
Zhengxin Fu, Bin Yu
semanticscholar   +3 more sources

Secure telemedicine using RONI halftoned visual cryptography without pixel expansion

Journal of Information Security and Applications, 2019
Abstract To provide quality healthcare services worldwide telemedicine is a well-known technique. It delivers healthcare services remotely. For the diagnosis of disease and prescription by the doctor, lots of information is needed to be shared over public and private channels. Medical information like MRI, X-Ray, CT-scan etc.
Arvind Bakshi, Anoop Kumar Patel
openaire   +2 more sources

A (2,2) XOR-based visual cryptography scheme without pixel expansion

Journal of Visual Communication and Image Representation, 2019
Abstract Visual cryptography (VC) is a technique that encodes the content of a secret image into two or more images, which are called shares. These shares are printed on transparencies and superimposed to reveal the original secret image. Frequently, VC techniques require a pixel expansion and a good alignment, which reduces the final spatial ...
Max E. Vizcarra Melgar   +1 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy