Results 221 to 230 of about 224,759 (272)

A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]

open access: yesEPJ Quantum Technol
Aquina N   +9 more
europepmc   +1 more source

Secret image sharing

Computers & Graphics, 2002
Abstract In this paper, we propose a method such that a secret image is shared by n shadow images, and any r shadow images (r⩽n) of them can be used to restore the whole secret image. The size of each shadow image is smaller than the secret image in our method.
Chih-Ching Thien, Ja-Chen Lin
openaire   +3 more sources

Secret image sharing with smaller shadow images

Pattern Recognition Letters, 2006
Secret image sharing is a technique for protecting images that involves the dispersion of the secret image into many shadow images. This endows the method with a higher tolerance against data corruption or loss than other image-protection mechanisms, such as encryption or steganography.
Ran-Zan Wang, Chin-Hui Su
openaire   +3 more sources

A hierarchical threshold secret image sharing

Pattern Recognition Letters, 2012
In the traditional secret image sharing schemes, the shadow images are generated by embedding the secret data into the cover image such that a sufficient number of shadow images can cooperate to reconstruct the secret image. In the process of reconstruction, each shadow image plays an equivalent role. However, a general threshold access structure could
Cheng Guo, Chin-Chen Chang, Chuan Qin
openaire   +3 more sources

Scalable secret image sharing

Signal Processing: Image Communication, 2007
In this paper, we propose an innovative scheme, namely the scalable secret image sharing scheme, for sharing an image O among n participants such that the clarity of the reconstructed image (i.e., the amount of information therein) scales with proportion with the number of the participants.
Ran-Zan Wang, Shyong-Jian Shyu
openaire   +1 more source

Relations Between Secret Sharing and Secret Image Sharing

2019
Secret sharing (SS) for (k, n) threshold generates secret data into n shadows, where any k or more shadows can reconstruct the secret while any \(k-1\) or less shadows reconstruct nothing of the secret. SS is useful for cloud computing security, block chain security and so on.
Xuehu Yan   +5 more
openaire   +1 more source

Construction-Based Secret Image Sharing

2020
Most secret image sharing (SIS) schemes output noise-like shadows and are fragile to any noise due to their restoring methods are based on mathematical operations. A noise-like shadow increases the suspicion of an attacker and the fragileness leads to the secret pixel is wrongly restored even if a bit error occurs.
Xuehu Yan   +4 more
openaire   +1 more source

Computationally secure secret image sharing

2017 Iranian Conference on Electrical Engineering (ICEE), 2017
A secret image sharing scheme is used to protect the confidentiality of important images and also to safeguard them against single point of failure. the first proposed secret image sharing scheme used a technique to reduce the size of shares to 1/t of the secret, the benefits of small share size drawn the attention of many researchers to that technique
Amir M. Ahmadian, Maryam Amirmazlaghani
openaire   +1 more source

Home - About - Disclaimer - Privacy