Results 11 to 20 of about 85,998 (202)
Meaningful Secret Image Sharing with Saliency Detection
Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed cloud storage.
Jingwen Cheng +4 more
doaj +1 more source
A High-Quality Authenticatable Visual Secret Sharing Scheme Using SGX
Visual cryptography scheme (VCS) is a secret-sharing scheme which encrypts images as shares and can decrypt shares without digital devices. Although a participant can reveal the secret image by merely stacking a sufficient number of shares, the visual ...
Denghui Zhang, Zhaoquan Gu
semanticscholar +1 more source
AMBTC-based visual secret sharing with different meaningful shadows.
Secret sharing based on Absolute Moment Block Truncation Coding (AMBTC) has been widely studied. However, the management of stego images is inconvenient as they seem indistinguishable.
Shudong Wang +4 more
semanticscholar +1 more source
Researchers have put forward many variations of schemes for secret image sharing on grounds of visual cryptography and polynomials. The authors of this paper put forward a novel scheme for sharing multiple secret images with perfect reconstruction and ...
Krishnaraj Bhat +3 more
doaj +1 more source
Secret image sharing (SIS) scheme is an important technology to protect secret information. It distributes the secret data into multiple shares so that the participants can obtain the embedded secret by sharing their authenticated shares.
Kai Gao, Ji-Hwei Horng, Chin-Chen Chang
doaj +1 more source
Data Hiding of Multicompressed Images Based on Shamir Threshold Sharing
Image-based data hiding methods have been used in the development of various applications in computer vision. At present, there are two main types of data hiding based on secret sharing, namely dual-image data hiding and multi-image data hiding.
Haoyang Kang, Lu Leng, Byung-Gyu Kim
doaj +1 more source
Encrypting Audio Data Hiding by Visual Secret Sharing [PDF]
Steganography and cryptography are usually used to ensure informationsafety in today’s data communication. This paper makes use of audiosteganography technique and encrypted secret sharing to increases the security level of hidden data.
Nidaa F. Hassan +2 more
doaj +1 more source
Visual Cryptography Scheme with Essential Participants
Visual cryptography scheme (VCS) shares a binary secret image into multiple shadows printed on transparencies. Stacking shadows can visually decode the secret image without computational resources. Specifically, a (k, n) threshold VCS ((k, n)-VCS) shares
Peng Li, Liping Yin, Jianfeng Ma
doaj +1 more source
Thumbnail Secret Image Sharing in Cloud Storage
In recent years, the amount of data has increased explosively, which has spawned the large-scale development of cloud storage. Increasingly, individuals and enterprises store images in cloud space.
Yongqiang Yu +4 more
doaj +1 more source
Linguistic Methods of Image Division for Visual Data Security
This paper defines new classes of algorithms for securing and sharing visual information. Algorithms offering data protection against unauthorised access are cryptographic protocols for data sharing and splitting.
Lidia Ogiela, Marek R. Ogiela
doaj +1 more source

