Results 21 to 30 of about 171,486 (208)
XOR-Based Progressively Secret Image Sharing
Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily.
Cheng-Shian Lin +2 more
doaj +1 more source
Visual secret sharing and related Works -A Review [PDF]
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj +1 more source
This paper presents a literature review that organizes studies on secret consumption and evaluates their contributions and limitations, in order to consider directions for future research.
Shunta Rokushima
doaj +1 more source
Revealing the secrets of secretion
An intracellular ion channel may have a central role in the release of cytokines by macrophages.
Antony Galione, Lianne C Davis
openaire +3 more sources
Publicly Verifiable Multi-stage Secret Sharing on General Access Structures [PDF]
A publicly verifiable secret sharing allows anyone to detect the cheating of dealer or participants only from the public information. In order to expand the application scope of multi-secret sharing, firstly, a publicly verifiable multi-stage secret ...
SONG Yun, WANG Ningning, XIAO Menglin, SHAO Zhiyi
doaj +1 more source
Editorial: The secrets of secretion [PDF]
Discussion on neutrophil exocytosis and priming.
openaire +2 more sources
An Implementation of Image Secret Sharing Scheme Based on Matrix Operations
The image secret sharing scheme shares a secret image as multiple shadows. The secret image can be recovered from shadow images that meet a threshold number.
Zihan Ren, Peng Li, Xin Wang
doaj +1 more source
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism
The traditional threshold secret sharing scheme only allows the participants’ sub-secret shares to be used once in the reconstruction process. Several multi-secret sharing schemes have been proposed that are related to cloud computing, aiming to improve ...
Ruonan Shi +4 more
doaj +1 more source
Applying cheating identifiable secret sharing scheme in multimedia security
In (k,n) secret sharing scheme, one secret is encrypted into n shares in such a way that only k or more shares can decrypt the secret. Secret sharing scheme can be extended into the field of multimedia that provides an efficient way to protect ...
Zheng Ma +4 more
doaj +1 more source
A Construction Method of (2, 3) Visual Cryptography Scheme
Visual cryptography scheme (VCS) shares a binary secret image into multiple shadows, stacking qualified set of shadows will decode the secret image without computer resources.
Peng Li +3 more
doaj +1 more source

