Results 1 to 10 of about 224,759 (272)

Nonlinear Secret Image Sharing Scheme [PDF]

open access: yesThe Scientific World Journal, 2014
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic.
Sang-Ho Shin, Gil-Je Lee, Kee-Young Yoo
doaj   +5 more sources

Meaningful Secret Image Sharing with Saliency Detection [PDF]

open access: yesEntropy, 2022
Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed cloud storage.
Jingwen Cheng   +4 more
doaj   +5 more sources

Reversible extended secret image sharing with ability to correct errors based on Chinese remainder theorem [PDF]

open access: yesHeliyon, 2023
The reversible extended secret image sharing (RESIS) scheme can safely segment the secret image into a shadow image and embed it into the cover image, while ensuring that both the secret image and the cover image are completely restored.
Chaoying Wang   +5 more
doaj   +2 more sources

A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection [PDF]

open access: yesSensors, 2020
Secret image sharing is a technique for sharing a secret message in such a fashion that stego image shadows are generated and distributed to individual participants.
Ching-Chun Chang   +3 more
doaj   +2 more sources

Essential Multi-Secret Image Sharing for Sensor Images [PDF]

open access: yesJournal of Imaging
In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels
Shang-Kuan Chen
doaj   +2 more sources

Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images [PDF]

open access: yesJournal of Electronic Imaging, 2013
[[abstract]]A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified ...
[[corresponding]]Chen, Chien-Chang   +1 more
core   +2 more sources

Biometric Privacy Using Secret Image Sharing [PDF]

open access: yesEngineering and Technology Journal, 2017
Biometric technique includes uniquely identifying person based on their physical or behavioral characteristics. It is mainly used for authentication. Iris scanning is one of the most secure techniques among all biometrics because of its uniqueness and ...
A.T. Hashim, D.A. Noori
doaj   +2 more sources

Visual secret sharing and related Works -A Review [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2023
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj   +1 more source

An Implementation of Image Secret Sharing Scheme Based on Matrix Operations

open access: yesMathematics, 2022
The image secret sharing scheme shares a secret image as multiple shadows. The secret image can be recovered from shadow images that meet a threshold number.
Zihan Ren, Peng Li, Xin Wang
doaj   +1 more source

A Secret Image Sharing Based on Logistic-Chebyshev Chaotic Map and Chinese Remainder Theorem [PDF]

open access: yesComputer Science Journal of Moldova, 2023
Visual secret sharing (VSS) was introduced in order to solve information security issues. It is a modern cryptographic technique. It involves breaking up a secret image into $n$ secured components known as shares.
Asmaa Hilmi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy