Results 71 to 80 of about 224,759 (272)

A novel meaningful secret image sharing method based on Arabic letters

open access: yesKuwait Journal of Science, 2016
In recent years, the providing of information security for multimedia has become an important subject of study. Visual cryptography and secret sharing is protected image contents without using complex mathematically operators.
Derya Avci
doaj  

Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures

open access: yesIET Information Security, 2021
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea   +1 more
doaj   +1 more source

Fueling Tomorrow: Scenario Planning for the Future of Gas Stations

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Transport electrification is reshaping the service infrastructures that mediate everyday mobility, yet most electrification scenario studies remain macrolevel and offer limited insight into how incumbent forecourt (gas‐station) networks can adapt under deep uncertainty.
Joao Gabriel Rosa   +2 more
wiley   +1 more source

A Construction Method of (2, 3) Visual Cryptography Scheme

open access: yesIEEE Access, 2020
Visual cryptography scheme (VCS) shares a binary secret image into multiple shadows, stacking qualified set of shadows will decode the secret image without computer resources.
Peng Li   +3 more
doaj   +1 more source

A Recursive Threshold Visual Cryptography Scheme [PDF]

open access: yes, 2008
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter ...
Kak, Subhash, Parakh, Abhishek
core   +1 more source

Weighted Threshold Secret Image Sharing [PDF]

open access: yes, 2009
Given a secret image I, a threshold r, and a set of n ( ≥ r) participants P = {1, 2, ... , n} with a set of weights W = {w 1, w 2, ... , w n } where w i is the weight (which indicates the degree/rank of importance) of participant i and we assume that w 1 ≤ w 2 ≤ ... w n . The idea of weighted threshold secret image sharing encodes I into n shadows S 1,
Shyong Jian Shyu   +3 more
openaire   +1 more source

Transformation Teams Leading the Hispanic‐Serving Institutions Movement at HSI Community Colleges

open access: yesNew Directions for Community Colleges, EarlyView.
ABSTRACT The Department of Education defunded discretionary grant programs for enrollment‐based minority‐serving institutions (MSIs) on September 10, 2025, yet Hispanic‐serving institutions (HSIs) still exist and must continue to adapt to their growing population of Latine/x students.
Gina Ann Garcia   +2 more
wiley   +1 more source

Sensitivity analysis and stochastic optimization of levelized cost of hydrogen production through methane pyrolysis

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Abstract Hydrogen plays a crucial role across multiple industrial sectors and is increasingly recognized as a clean energy carrier with significant potential in decarbonization efforts. Methane pyrolysis (MP), particularly using molten metal catalysts, offers a promising pathway for hydrogen production with low CO2 emissions.
Adrian Paredes Bozzo, Zukui Li
wiley   +1 more source

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES [PDF]

open access: yes
Visual secret sharing schemes (VSS) represent an important concept of visual cryptography. They permit the sharing of a secret image between multiple participants so that only authorized groups can recover the secret.
Ruxandra Olimid
core  

A partial envelope approach for modelling multivariate spatial‐temporal data

open access: yesCanadian Journal of Statistics, EarlyView.
Abstract In the new era of big data, modelling multivariate spatial‐temporal data is a challenging task due to both the high dimensionality of the features and complex associations among the responses across different locations and time points.
Reisa Widjaja   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy