Results 81 to 90 of about 3,018,405 (324)
Essential Multi-Secret Image Sharing for Sensor Images
In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels
Shang-Kuan Chen
doaj +1 more source
An Epitome of Multi Secret Sharing Schemes for General Access Structure [PDF]
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the ...
Binu, V P, Sreekumar, A
core
Information Flow in Secret Sharing Protocols
The entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC), error correction and secret ...
Damian Markham +5 more
core +3 more sources
Abstract Domesticated European rabbits (Oryctolagus cuniculus) have long been chosen as laboratory model organisms. Despite this, there has been no definitive study of the vertebral musculature of wild rabbits. Relevant descriptions of well‐studied veterinary model mammals (such as dogs) are generally applicable, but not appropriate for a species ...
Nuttakorn Taewcharoen +3 more
wiley +1 more source
Color Visual Secret Sharing for QR Code with Perfect Module Reconstruction
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc.
Tao Liu, Bin Yan, Jeng-Shyang Pan
doaj +1 more source
Secret Sharing and Shared Information
Secret sharing is a cryptographic discipline in which the goal is to distribute information about a secret over a set of participants in such a way that only specific authorized combinations of participants together can reconstruct the secret.
Rauh, Johannes
core +2 more sources
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley +1 more source
Advancing Cave Survey Methods: High‐Precision Mapping in Drakotrypa Cave, Greece
ABSTRACT Cave floor mapping plays a vital role across various scientific disciplines by enabling the identification and interpretation of features shaped by both natural processes and human activity. In cave archaeology, floor mapping is crucial to decode and reconstruct human‐induced morphological features.
Christos Pennos +5 more
wiley +1 more source
A global progressive image secret sharing scheme under multi-group joint management
Diverging from traditional secret sharing schemes, group secret sharing schemes enable the recovery of secret information through collaborative efforts among groups.
Lina Zhang +3 more
doaj +1 more source
Comparing Security Notions of Secret Sharing Schemes
Different security notions of secret sharing schemes have been proposed by different information measures. Entropies, such as Shannon entropy and min entropy, are frequently used in the setting security notions for secret sharing schemes.
Songsong Dai, Donghui Guo
doaj +1 more source

