Results 171 to 180 of about 3,112 (196)
Some of the next articles are maybe not open access.
Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images
Journal of Electronic Imaging, 2013A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users’ secret keys and shared images. A cheated secret key or shared image leads to
Chien-Chang Chen, Chong-An Liu
openaire +1 more source
Multi-layer Secret Image Sharing
2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2010Secret image sharing is a sharing method to transmit and store images with fault tolerance property. The paper proposes a recursive method to extend conventional secret image sharing more general in application which is named multi-layer secret image sharing. It enables users more controllability to secret images than conventional secret image sharing.
openaire +1 more source
Multiple secret images in multiple sharing images
SPIE Proceedings, 2012Internet based communications are evolving at a tremendous rate. Encryption of data has become an important way to protect data resources especially on the Internet, intranets and extranets. Steganography is a process of hiding data inside a sharing medium. A technique of hiding multiple images in multiple sharing images is proposed.
Rajasekar Velswamy +3 more
openaire +1 more source
Secret image sharing with smaller shadow images
Pattern Recognition Letters, 2006Secret image sharing is a technique for protecting images that involves the dispersion of the secret image into many shadow images. This endows the method with a higher tolerance against data corruption or loss than other image-protection mechanisms, such as encryption or steganography.
Ran-Zan Wang, Chin-Hui Su
openaire +1 more source
Exploring secret image sharing with embedding of shares
2018 2nd International Conference on Inventive Systems and Control (ICISC), 2018Protecting the confidentiality of information has become a significant issue in information security. Secret sharing is an important technique that helps to protect the confidentiality of information. A dealer divides a secret into several shares that are distributed among a group of participants.
Priyanka R Kamble, Sonali Patil
openaire +1 more source
Secret Sharing Using Meaningful Images
Journal of Advanced Management Science, 2013In recent years, image sharing method has attracted much attention for protecting the security of secret images. Pixel expansion, meaningless sharing, and bad recovering quality are the important issues that need to be improved. The paper proposes a new image sharing method to remove the above problems.
openaire +1 more source
A new Boolean-based multiple secret image sharing scheme to share different sized secret images
Journal of Information Security and Applications, 2017The proposed Boolean-based multiple secret image sharing technique can share many secret images among participants using low computational Boolean operations. Previous studies dealt with sharing identically sized secret images; however, secret images may be of different sizes when applied to general usage.
Chien-Chang Chen, Jun-Long Chen
openaire +2 more sources
Fast-weighted secret image sharing
Optical Engineering, 2009Thien and Lin [Comput. and Graphics 26 (5), 765-770 (2002)] proposed a threshold scheme to share a secret image among n shadows: any t of the n shadows can recover the secret, whereas t-1 or fewer shadows cannot. However, in real life, certain managers probably play key roles to run a company and thus need special authority to recover the secret in ...
openaire +1 more source
Invertible secret image sharing with steganography
Pattern Recognition Letters, 2010The essence of invertible image sharing approaches is that the revealed content of the secret image must be lossless and the distorted stego images must be able to be reverted to the original cover image. In order to achieve these purposes, we first transform the secret pixels into the m-ary notational system and then calculate the information data ...
Pei-Yu Lin, Chi-Shiang Chan
openaire +1 more source
Nested compartment secret image sharing scheme
2014 22nd Signal Processing and Communications Applications Conference (SIU), 2014In the traditional secret sharing schemes, all participants are equal in terms of privileges but in special situations participants may not be equal. In this article we consider generalized compartment access structure and linear secret sharing schemes for their realization.
Katira Soleymanzadeh, Vasif V. Nabiyev
openaire +1 more source

