Results 61 to 70 of about 85,998 (202)

An XOR-Based (k, n) Visual Fully Independent Secrets Sharing Scheme with Meaningful Shares

open access: yesApplied Sciences
With the rapid advancement of technology, data transmission security has become an increasingly critical issue. Visual Cryptography Scheme (VCS) provides a secure method for sharing secret images without complex computation—by stacking multiple shares ...
Wen-Ting Lee, Justie Su-Tzu Juan
doaj   +1 more source

METHOD OF CONTENT-DEPENDENT WATERMARKING IMAGES BASED ON SECURITY VISUAL SECRET SHARING SCHEME

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
A method of content-dependent watermarking images without embedding digital watermark based on visual secret sharing scheme, which allows to encrypt the digital watermark as a noise like secret and public shadow images using binary content-dependent ...
A. A. Boriskevich
doaj  

Secret image sharing with multi-sized shadow images: Balancing concealment and communication overhead

open access: yesJournal of King Saud University: Computer and Information Sciences
Secret image sharing (SIS) possesses advantageous attributes such as loss tolerance, offering a promising solution for image protection. However, the issue remains unresolved, which is the trade-off between the transmission or storage overhead of shadow ...
Guozheng Yang   +4 more
doaj   +1 more source

Probability Distribution Tree-Based Dishonest-Participant-Resistant Visual Secret Sharing Using Linearly Polarized Shares

open access: yesAlgorithms
With the rapid growth of data transmission and visual encryption technologies, Visual Secret Sharing (VSS) has become an important technique for image-based information protection.
Shuvroo JadidAhabab, Laxmisha Rai
doaj   +1 more source

An enhanced image protection framework: polynomial-based secret sharing meets information hiding

open access: yesJournal of King Saud University: Computer and Information Sciences
The security of modern communication requires not only the confidentiality of communication content but also the concealment of communication behavior.
Xiaopeng Li   +3 more
doaj   +1 more source

Lossless sharing visual cryptography

open access: yesTongxin xuebao, 2013
According to the information loss during the secret image sharing process, the lossless sharing visual crypto-graphy was proposed. The optimizations of two parameters were simplified into one parameter.
Bin YU, Zheng-xin FU
doaj  

VISUAL SECRET SHARING: A REVIEW

open access: yesJournal of critical reviews, 2020
openaire   +1 more source

Home - About - Disclaimer - Privacy