Results 21 to 30 of about 1,949,204 (276)
A Novel Quantum Visual Secret Sharing Scheme
Inspired by Naor et al.'s visual secret sharing (VSS) scheme, a novel n out of n quantum visual secret sharing (QVSS) scheme is proposed, which consists of two phases: sharing process and recovering process. In the first process, the color information of
Wenjie Liu +4 more
doaj +1 more source
To improve the accuracy of color image completion with missing entries, we present a recovery method based on generalized higher-order scalars. We extend the traditional second-order matrix model to a more comprehensive higher-order matrix equivalent ...
Liang Liao +9 more
doaj +1 more source
Fast coppicing plantations like Eucalyptus are becoming an ever increasingly important land use system globally, including the Eucalyptus hotspot highlands of Northwestern Ethiopia.
Amare Tesfaw +3 more
doaj +1 more source
In previous research, scholars always think about how to improve the information hiding algorithm and strive to have the largest embedding capacity and better image quality, restoring the original image.
Chin-Feng Lee, Hua-Zhe Wu
doaj +1 more source
CrossPatch-Based Rolling Label Expansion for Dense Stereo Matching
We present a novel algorithm called crosspatch-based rolling label expansion for accurate stereo matching. This optimization-based approach can effectively estimate the 3D label of each pixel from huge and infinite label space and then generate a ...
Huaiyuan Xu +5 more
doaj +1 more source
In this paper, the image sensor compensation frameworks are established based on the correlation of pixel response characteristics; The pixel response model is established, and a method to measure the crosstalk of adjacent pixels of color image sensor ...
Qiang Wen +6 more
doaj +1 more source
Lossless sharing visual cryptography
According to the information loss during the secret image sharing process, the lossless sharing visual crypto-graphy was proposed. The optimizations of two parameters were simplified into one parameter.
Bin YU, Zheng-xin FU
doaj +2 more sources
How to hide messages in digital images so that messages cannot be discovered and tampered with is a compelling topic in the research area of cybersecurity.
Heng-Xiao Chi +3 more
doaj +1 more source
Correlation of the differential expression of PIK3R1 and its spliced variant, p55α, in pan‐cancer
PIK3R1 undergoes alternative splicing to generate the isoforms, p85α and p55α. By combining large patient datasets with laboratory experiments, we show that PIK3R1 spliced variants shape cancer behavior. While tumors lose the protective p85α isoform, p55α is overexpressed, changes linked to poorer survival and more pronounced in African American ...
Ishita Gupta +10 more
wiley +1 more source
Reversible Data Hiding Scheme in Homomorphic Encrypted Image Based on EC-EG
To combine homomorphic public key encryption with reversible data hiding, a reversible data hiding scheme in homomorphic encrypted image based on EC-EG is proposed. Firstly, the cover image is segmented.
Neng Zhou +5 more
doaj +1 more source

