Results 231 to 240 of about 224,759 (272)
Some of the next articles are maybe not open access.
Multiple Secret Images Sharing Scheme
2008 IEEE Region 10 and the Third international Conference on Industrial and Information Systems, 2008Secret sharing is an efficient method of transmitting the image securely. This paper discusses an efficient secret sharing scheme for multiple secret images. It has been shown through the experimental result that the proposed scheme transmits the images secretly and then efficiently recovers the same at the receiver end.
Vinay Rishiwal +3 more
openaire +1 more source
Visual Cryptography and Secret Image Sharing
2017With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and ...
S. Cimato, C. N. Yang
openaire +2 more sources
An Image Secret Sharing Method
2006 9th International Conference on Information Fusion, 2006This paper presents an image secret sharing method which essentially incorporates two k-out-of-n secret sharing schemes: i) Shamir's secret sharing scheme and ii) matrix projection secret sharing scheme. The technique allows a secret image to be divided as n image shares so that: i) any k image shares (k ? n) can be used to reconstruct the secret image
Li Bai +3 more
openaire +1 more source
Multi-layer Secret Image Sharing
2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2010Secret image sharing is a sharing method to transmit and store images with fault tolerance property. The paper proposes a recursive method to extend conventional secret image sharing more general in application which is named multi-layer secret image sharing. It enables users more controllability to secret images than conventional secret image sharing.
openaire +1 more source
Multiple secret images in multiple sharing images
SPIE Proceedings, 2012Internet based communications are evolving at a tremendous rate. Encryption of data has become an important way to protect data resources especially on the Internet, intranets and extranets. Steganography is a process of hiding data inside a sharing medium. A technique of hiding multiple images in multiple sharing images is proposed.
Rajasekar Velswamy +3 more
openaire +1 more source
Exploring secret image sharing with embedding of shares
2018 2nd International Conference on Inventive Systems and Control (ICISC), 2018Protecting the confidentiality of information has become a significant issue in information security. Secret sharing is an important technique that helps to protect the confidentiality of information. A dealer divides a secret into several shares that are distributed among a group of participants.
Priyanka R Kamble, Sonali Patil
openaire +1 more source
Secret Sharing Using Meaningful Images
Journal of Advanced Management Science, 2013In recent years, image sharing method has attracted much attention for protecting the security of secret images. Pixel expansion, meaningless sharing, and bad recovering quality are the important issues that need to be improved. The paper proposes a new image sharing method to remove the above problems.
openaire +1 more source
A new Boolean-based multiple secret image sharing scheme to share different sized secret images
Journal of Information Security and Applications, 2017The proposed Boolean-based multiple secret image sharing technique can share many secret images among participants using low computational Boolean operations. Previous studies dealt with sharing identically sized secret images; however, secret images may be of different sizes when applied to general usage.
Chien-Chang Chen, Jun-Long Chen
openaire +2 more sources
Fast-weighted secret image sharing
Optical Engineering, 2009Thien and Lin [Comput. and Graphics 26 (5), 765-770 (2002)] proposed a threshold scheme to share a secret image among n shadows: any t of the n shadows can recover the secret, whereas t-1 or fewer shadows cannot. However, in real life, certain managers probably play key roles to run a company and thus need special authority to recover the secret in ...
openaire +1 more source
Invertible secret image sharing with steganography
Pattern Recognition Letters, 2010The essence of invertible image sharing approaches is that the revealed content of the secret image must be lossless and the distorted stego images must be able to be reverted to the original cover image. In order to achieve these purposes, we first transform the secret pixels into the m-ary notational system and then calculate the information data ...
Pei-Yu Lin, Chi-Shiang Chan
openaire +1 more source

