Zobrazeno 1 - 10
of 1 765
pro vyhledávání: '"Image sharing"'
Publikováno v:
CAAI Transactions on Intelligence Technology, Vol 9, Iss 2, Pp 388-410 (2024)
Abstract In traditional secret image sharing schemes, a secret image is shared among shareholders who have the same position. But if the shareholders have two different positions, essential and non‐essential, it is necessary to use essential secret
Externí odkaz:
https://doaj.org/article/9e657714cc3f4ccab649fafa96eee3ab
Publikováno v:
Cybersecurity, Vol 6, Iss 1, Pp 1-14 (2023)
Abstract With the advancement of communication technology, a large number of data are constantly transmitted through the internet for various purposes, which are prone to be illegally accessed by third parties. Therefore, securing such data is crucia
Externí odkaz:
https://doaj.org/article/9728fd366c7147d5879d2aaeb98f4492
Publikováno v:
IEEE Access, Vol 11, Pp 98333-98361 (2023)
The safeguarding of digitized data against unwanted access and modification has become an issue of utmost importance as a direct result of the rapid development of network technology and internet applications. In response to this challenge, numerous
Externí odkaz:
https://doaj.org/article/2c8ecd18a02241c182cef25052a829b4
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 10, Pp 101854- (2023)
With the increasing concern for public privacy protection, Secret Image Sharing (SIS) has garnered significant attention among researchers. The goal of SIS is to split a secret image into multiple shadows, rendering it unrecoverable unless a specific
Externí odkaz:
https://doaj.org/article/ad7cbb312ff4499e8c56b58a6420de2e
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 10, Pp 101801- (2023)
Videos and image processing have significantly transformed computer vision, enabling computers to analyse, and manipulate visual data. The proliferation of cameras and IR equipment has facilitated the collection of valuable information about individu
Externí odkaz:
https://doaj.org/article/94e213642dda48c29bb0696c7c40c35f
Autor:
Bishoy K. Sharobim, Marwan A. Fetteha, Salwa K. Abd-El-Hafiz, Wafaa S. Sayed, Lobna A. Said, Ahmed G. Radwan
Publikováno v:
IEEE Access, Vol 11, Pp 9511-9520 (2023)
Multi-Secret Image Sharing (MSIS) is important in information security when multiple images are shared in an unintelligible form to different participants, where the images can only be recovered using the shares from participants. This paper proposes
Externí odkaz:
https://doaj.org/article/77c950eb4ea34d2db94059684a27cc27
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 10, Pp 9252-9272 (2022)
Image encryption is an effective method to protect private images by converting them into meaningless ones, but many current image encryption algorithms still have security and efficiency problems. This paper combines compressed sensing (CS) and secr
Externí odkaz:
https://doaj.org/article/5849ce2c0e674f96bad2e127fcad28eb
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.