Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Aishwarya Nandakumar"'
Publikováno v:
Procedia Engineering. 30:945-952
Most of the image secret sharing schemes employ linear secret sharing such as Shamir's secret sharing scheme. Linear secret sharing threshold schemes are vulnerable to cheating problem (Tompa-Woll attack), where a participant can submit a false share
Publikováno v:
Advances in Computing and Communications ISBN: 9783642227196
ACC (3)
ACC (3)
To improve embedding efficiency, one of the most important steganographic scheme isMatrix embedding, otherwise known as syndrome coding. The schemes that employ matrix embedding is generally more secure because it brings about lower embedding changes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4b042c0cdc78179fbbe823e13dbc3b2c
https://doi.org/10.1007/978-3-642-22720-2_27
https://doi.org/10.1007/978-3-642-22720-2_27
Publikováno v:
Advances in Computing and Communications ISBN: 9783642227134
ACC (2)
ACC (2)
Steganography and Visual Cryptography are two areas in which many studies and intensive research have been carried out. Even though the basic idea of both areas in hiding information are similar,steganography and visual cryptography makes use of diff
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5c1dccb9ff4039e7730308f3f2420258
https://doi.org/10.1007/978-3-642-22714-1_51
https://doi.org/10.1007/978-3-642-22714-1_51
Publikováno v:
Advances in Computing and Communications ISBN: 9783642227134
ACC (2)
ACC (2)
A novel approach to secret image sharing based on a (t,n)-threshold scheme with steganography is proposed. A secret image is first processed into n-shares which are then hidden in n-user selected different cover/camouflage images. Any t out of n part
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b6a82eb2c107ba2e14419289991a4c75
https://doi.org/10.1007/978-3-642-22714-1_50
https://doi.org/10.1007/978-3-642-22714-1_50
Publikováno v:
A2CWiC
Wireless security is becoming an important area of product research and development. Wireless Intrusion detection Systems are commonly used in WLAN network for detecting wireless attacks. Classifiers are commonly used as detectors in these systems. F
Publikováno v:
Journal of Obstetrics & Gynecology of India; 2023 Suppl1, Vol. 73, p83-87, 5p
Publikováno v:
2013 IEEE International Workshop on Measurements & Networking (M&N); 2013, p155-160, 6p
Publikováno v:
Proceedings of the 1st Amrita ACM-W Celebration: Women in Computing in India; 9/16/2010, p1-7, 7p
This book covers various topics, including collective intelligence, intelligent transportation systems, fuzzy systems, Bayesian network, ant colony optimization, data privacy and security, data mining, data warehousing, big data analytics, cloud comp
This two-volume book constitutes the post-conference proceedings of the 5th International Conference on Advances in Computing and Data Sciences, ICACDS 2021, held in Nashik, India, in April 2021.•The 103 full papers were carefully reviewed and sele