Results 1 to 10 of about 224,759 (272)
Nonlinear Secret Image Sharing Scheme [PDF]
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic.
Sang-Ho Shin, Gil-Je Lee, Kee-Young Yoo
doaj +5 more sources
Meaningful Secret Image Sharing with Saliency Detection [PDF]
Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed cloud storage.
Jingwen Cheng +4 more
doaj +5 more sources
Reversible extended secret image sharing with ability to correct errors based on Chinese remainder theorem [PDF]
The reversible extended secret image sharing (RESIS) scheme can safely segment the secret image into a shadow image and embed it into the cover image, while ensuring that both the secret image and the cover image are completely restored.
Chaoying Wang +5 more
doaj +2 more sources
A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection [PDF]
Secret image sharing is a technique for sharing a secret message in such a fashion that stego image shadows are generated and distributed to individual participants.
Ching-Chun Chang +3 more
doaj +2 more sources
Essential Multi-Secret Image Sharing for Sensor Images [PDF]
In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels
Shang-Kuan Chen
doaj +2 more sources
Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images [PDF]
[[abstract]]A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified ...
[[corresponding]]Chen, Chien-Chang +1 more
core +2 more sources
Biometric Privacy Using Secret Image Sharing [PDF]
Biometric technique includes uniquely identifying person based on their physical or behavioral characteristics. It is mainly used for authentication. Iris scanning is one of the most secure techniques among all biometrics because of its uniqueness and ...
A.T. Hashim, D.A. Noori
doaj +2 more sources
Visual secret sharing and related Works -A Review [PDF]
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj +1 more source
An Implementation of Image Secret Sharing Scheme Based on Matrix Operations
The image secret sharing scheme shares a secret image as multiple shadows. The secret image can be recovered from shadow images that meet a threshold number.
Zihan Ren, Peng Li, Xin Wang
doaj +1 more source
A Secret Image Sharing Based on Logistic-Chebyshev Chaotic Map and Chinese Remainder Theorem [PDF]
Visual secret sharing (VSS) was introduced in order to solve information security issues. It is a modern cryptographic technique. It involves breaking up a secret image into $n$ secured components known as shares.
Asmaa Hilmi +2 more
doaj +1 more source

