Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Meaningful shadows"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 10, Pp 101854- (2023)
With the increasing concern for public privacy protection, Secret Image Sharing (SIS) has garnered significant attention among researchers. The goal of SIS is to split a secret image into multiple shadows, rendering it unrecoverable unless a specific
Externí odkaz:
https://doaj.org/article/ad7cbb312ff4499e8c56b58a6420de2e
Publikováno v:
Mathematical Biosciences and Engineering, Vol 19, Iss 11, Pp 11544-11562 (2022)
JPEG is the most common format for storing and transmitting photographic images on social network platforms. JPEG image is widely used in people's life because of their low storage space and high visual quality. Secret image sharing (SIS) technology
Externí odkaz:
https://doaj.org/article/d007b94c2b264659bbaf68fb7e612696
Publikováno v:
Mathematical Biosciences and Engineering, Vol 18, Iss 5, Pp 5236-5251 (2021)
Secret sharing based on Absolute Moment Block Truncation Coding (AMBTC) has been widely studied. However, the management of stego images is inconvenient as they seem indistinguishable. Moreover, there exists a problem of pixel expansion, which requir
Externí odkaz:
https://doaj.org/article/0d4bc55516304c22a7a25c47a7e3ae06
Publikováno v:
Mathematical Biosciences and Engineering, Vol 17, Iss 4, Pp 2950-2966 (2020)
The polynomial-based image secret sharing (ISS) scheme encodes a secret image into n shadows assigned to n participants. The secret image with high resolution is decoded by Lagrange interpolation when collecting any k or more shadows. Thus, ISS is us
Externí odkaz:
https://doaj.org/article/adc9156ab7c949f58562e728f4ab99af
Publikováno v:
Mathematics, Vol 10, Iss 18, p 3241 (2022)
In meaningful secret image sharing (MSIS), a secret image is divided into n shadows. Each shadow is meaningful and similar to the corresponding cover image. Meaningful shadows can reduce the suspicion of attackers in transmission and facilitate shado
Externí odkaz:
https://doaj.org/article/ee03530840314364b5da10ae89357d9b
Publikováno v:
Entropy, Vol 24, Iss 3, p 340 (2022)
Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed cloud storage. In traditional secret imag
Externí odkaz:
https://doaj.org/article/be6364b872d24355ade4e3f62ff01646
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Mathematical Biosciences and Engineering, Vol 18, Iss 5, Pp 5236-5251 (2021)
Secret sharing based on Absolute Moment Block Truncation Coding (AMBTC) has been widely studied. However, the management of stego images is inconvenient as they seem indistinguishable. Moreover, there exists a problem of pixel expansion, which requir
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.