Zobrazeno 1 - 10
of 731
pro vyhledávání: '"Secret Image Sharing"'
Publikováno v:
CAAI Transactions on Intelligence Technology, Vol 9, Iss 2, Pp 388-410 (2024)
Abstract In traditional secret image sharing schemes, a secret image is shared among shareholders who have the same position. But if the shareholders have two different positions, essential and non‐essential, it is necessary to use essential secret
Externí odkaz:
https://doaj.org/article/9e657714cc3f4ccab649fafa96eee3ab
Autor:
Wang, Rui a, b, 1, Li, Longlong a, b, 1, Yan, Xuehu a, b, Yan, Wei a, b, Liu, Yali a, b, Yang, Guozheng a, b, ⁎
Publikováno v:
In Signal Processing May 2025 230
Publikováno v:
IEEE Access, Vol 11, Pp 98333-98361 (2023)
The safeguarding of digitized data against unwanted access and modification has become an issue of utmost importance as a direct result of the rapid development of network technology and internet applications. In response to this challenge, numerous
Externí odkaz:
https://doaj.org/article/2c8ecd18a02241c182cef25052a829b4
Publikováno v:
Cybersecurity, Vol 6, Iss 1, Pp 1-14 (2023)
Abstract With the advancement of communication technology, a large number of data are constantly transmitted through the internet for various purposes, which are prone to be illegally accessed by third parties. Therefore, securing such data is crucia
Externí odkaz:
https://doaj.org/article/9728fd366c7147d5879d2aaeb98f4492
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 10, Pp 101854- (2023)
With the increasing concern for public privacy protection, Secret Image Sharing (SIS) has garnered significant attention among researchers. The goal of SIS is to split a secret image into multiple shadows, rendering it unrecoverable unless a specific
Externí odkaz:
https://doaj.org/article/ad7cbb312ff4499e8c56b58a6420de2e
Autor:
Bishoy K. Sharobim, Marwan A. Fetteha, Salwa K. Abd-El-Hafiz, Wafaa S. Sayed, Lobna A. Said, Ahmed G. Radwan
Publikováno v:
IEEE Access, Vol 11, Pp 9511-9520 (2023)
Multi-Secret Image Sharing (MSIS) is important in information security when multiple images are shared in an unintelligible form to different participants, where the images can only be recovered using the shares from participants. This paper proposes
Externí odkaz:
https://doaj.org/article/77c950eb4ea34d2db94059684a27cc27
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 10, Pp 9252-9272 (2022)
Image encryption is an effective method to protect private images by converting them into meaningless ones, but many current image encryption algorithms still have security and efficiency problems. This paper combines compressed sensing (CS) and secr
Externí odkaz:
https://doaj.org/article/5849ce2c0e674f96bad2e127fcad28eb
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Mathematical Biosciences and Engineering, Vol 19, Iss 11, Pp 11544-11562 (2022)
JPEG is the most common format for storing and transmitting photographic images on social network platforms. JPEG image is widely used in people's life because of their low storage space and high visual quality. Secret image sharing (SIS) technology
Externí odkaz:
https://doaj.org/article/d007b94c2b264659bbaf68fb7e612696