Results 211 to 220 of about 1,949,204 (276)
Some of the next articles are maybe not open access.
Reversible data hiding method based on pixel expansion and homomorphic encryption
Journal of Intelligent & Fuzzy Systems, 2020Digital image steganography algorithms usually suffer from a lossy restoration of the cover content after extraction of a secret message. When a cover object and confidential information are both utilised, the reversible property of the cover is inevitable.
Anushiadevi, R. +3 more
openaire +2 more sources
Data Hiding Using Multi-Pixel Difference Expansion
2018 3rd International Conference on Computer and Communication Systems (ICCCS), 2018This paper proposed a reversible multiple layer data hiding to improve the method proposed by Arham et al. Using the relevance of pixels to modify the block size and change the scan mode can enhance image embedded capacity so that the maximum embedding amount of the original block was increased from 3 bits to 8 bits.
Chin-Feng Lee, Jau Ji Shen, Yu Hua Lai
openaire +2 more sources
Cheating Immune Visual Cryptographic Scheme with Reduced Pixel Expansion
2018One of the drawbacks in visual cryptography is cheating attacks, where the malicious adversaries can cheat the honest participant by submitting fake shares during reconstruction phase. Cheating immune visual cryptographic schemes are used for mitigating cheating attacks in visual cryptography.
Kanakkath Praveen, M. Sethumadhavan
openaire +2 more sources
(2,3) RIVC Scheme in Visual Cryptography without Pixel Expansion
2013 2nd International Conference on Advanced Computing, Networking and Security, 2013Region Incrementing Visual Cryptography (RIVC) was first introduced by R Z Wang in 2009. (2, n) region incrementing visual cryptographic scheme gradually reconstructs the secrets in a single image with multiple security levels. But Wang's scheme suffers from color reversal and pixel expansion.
Anila Thankappan, M. Wilscy
openaire +2 more sources
An Insight into Pixel Value Ordering Prediction Based Prediction-error Expansion
IEEE Transactions on Information Forensics and Security, 2020As the core of prediction-error expansion technique, prediction method has a fundamental impact on performance of reversible data hiding. Pixel value ordering (PVO) prediction has been extensively investigated for its high accuracy. However, the correlation of pixels within block has not been fully exploited yet.
Wenguang He, Zhanchuan Cai
openaire +2 more sources
Novel Visual Cryptography Schemes Without Pixel Expansion for Halftone Images
Canadian Journal of Electrical and Computer Engineering, 2014Visual cryptography (VC) is a secret-sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed. While VC was developed for application to binary images, and is inherently based on binary logical operations, it can be applied to grayscale images through their halftone ...
Nazanin Askari +2 more
openaire +2 more sources
The image multiple secret sharing schemes without pixel expansion
2011 International Conference on Machine Learning and Cybernetics, 2011In this paper, two secret sharing schemes were proposed. The two schemes both have the characteristic that the share images they produced are with no pixel expansion. In encoding phase, the rotated share scheme creates two share images for hiding three secret images, whereas the Exclusive OR rotated scheme achieve three share images for hiding four ...
Ching-Lin Wang +2 more
openaire +2 more sources
A (2,2) secret sharing scheme for visual cryptography without Pixel Expansion
2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015Secret sharing scheme denes a method by which a secret image can be distributed between a group of participants, whereby each participant is collected a piece of the secret. This piece of the secret is known as a share. The original secret image can be only be recovered when a sufficient number of shares are combined together.
Mahmoud E. Hodeish, V. T. Humbe
openaire +2 more sources
2017 Artificial Intelligence and Signal Processing Conference (AISP), 2017
In this paper, a reversible data hiding (RDH) scheme based on prediction-error expansion (PEE) technique is proposed. PEE-based RDH methods exploit the correlations between neighboring pixels of the cover image to predict the pixel values and then embed data into the expanded prediction-errors. Traditional predictors exploit only the neighboring pixels
Peyman Rahmani +1 more
openaire +2 more sources
In this paper, a reversible data hiding (RDH) scheme based on prediction-error expansion (PEE) technique is proposed. PEE-based RDH methods exploit the correlations between neighboring pixels of the cover image to predict the pixel values and then embed data into the expanded prediction-errors. Traditional predictors exploit only the neighboring pixels
Peyman Rahmani +1 more
openaire +2 more sources
A Cheat-Prevention Visual Secret Sharing Scheme with Efficient Pixel Expansion
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013A visual secret sharing (VSS) scheme with minimum pixel expansion is proposed to prevent malicious participants from deceiving an honest participant. A VSS scheme encrypts a secret image into pieces referred to as shares where each participant keeps a share so that stacking sufficient number of shares recovers the secret image.
Shenchuan LIU +2 more
openaire +2 more sources

