Results 21 to 30 of about 171,486 (208)

XOR-Based Progressively Secret Image Sharing

open access: yesMathematics, 2021
Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily.
Cheng-Shian Lin   +2 more
doaj   +1 more source

Visual secret sharing and related Works -A Review [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2023
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj   +1 more source

Secret Consumption:

open access: yesMaketingu Janaru, 2023
This paper presents a literature review that organizes studies on secret consumption and evaluates their contributions and limitations, in order to consider directions for future research.
Shunta Rokushima
doaj   +1 more source

Revealing the secrets of secretion

open access: yeseLife, 2018
An intracellular ion channel may have a central role in the release of cytokines by macrophages.
Antony Galione, Lianne C Davis
openaire   +3 more sources

Publicly Verifiable Multi-stage Secret Sharing on General Access Structures [PDF]

open access: yesJisuanji kexue yu tansuo, 2023
A publicly verifiable secret sharing allows anyone to detect the cheating of dealer or participants only from the public information. In order to expand the application scope of multi-secret sharing, firstly, a publicly verifiable multi-stage secret ...
SONG Yun, WANG Ningning, XIAO Menglin, SHAO Zhiyi
doaj   +1 more source

Editorial: The secrets of secretion [PDF]

open access: yesJournal of Leukocyte Biology, 2017
Discussion on neutrophil exocytosis and priming.
openaire   +2 more sources

An Implementation of Image Secret Sharing Scheme Based on Matrix Operations

open access: yesMathematics, 2022
The image secret sharing scheme shares a secret image as multiple shadows. The secret image can be recovered from shadow images that meet a threshold number.
Zihan Ren, Peng Li, Xin Wang
doaj   +1 more source

ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
The traditional threshold secret sharing scheme only allows the participants’ sub-secret shares to be used once in the reconstruction process. Several multi-secret sharing schemes have been proposed that are related to cloud computing, aiming to improve ...
Ruonan Shi   +4 more
doaj   +1 more source

Applying cheating identifiable secret sharing scheme in multimedia security

open access: yesEURASIP Journal on Image and Video Processing, 2020
In (k,n) secret sharing scheme, one secret is encrypted into n shares in such a way that only k or more shares can decrypt the secret. Secret sharing scheme can be extended into the field of multimedia that provides an efficient way to protect ...
Zheng Ma   +4 more
doaj   +1 more source

A Construction Method of (2, 3) Visual Cryptography Scheme

open access: yesIEEE Access, 2020
Visual cryptography scheme (VCS) shares a binary secret image into multiple shadows, stacking qualified set of shadows will decode the secret image without computer resources.
Peng Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy