Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by  and +1
    •   7  
      EngineeringImage QualityVisual CryptographyInformation Forensics
Because of lack of infrastructure and Central Authority(CA), secure communication is a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its nodes resource tightness and mobility feature. The role of... more
    • by  and +1
    •   34  
      Mathematics of CryptographyApplied CryptographyCryptographyQuantum Cryptography
In this paper, we propose a novel (2,2)(2,2) verifiable secret sharing (VSS) scheme, which not only protects a secret image but also allows users to verify the restored secret image in the revealing and verifying phase, for all binary,... more
    • by 
    •   16  
      Image ProcessingComputational ComplexityPattern RecognitionPrevention
In 2007, Wang et al. proposed two visual secret sharing (VSS) schemes based on Boolean operations. The first one is a probabilistic (2, n) secret sharing scheme called (2, n) ProbVSS scheme for binary images. The other is a deterministic... more
    • by 
    •   4  
      Computational ComplexitySearch AlgorithmColor ImageVisual Secret Sharing
In this paper, we are presenting blind authentication method which is based on harmonic secret sharing technique and permutation with data repair capability and error localization for document image and verification of its owner, with the... more
    • by 
    •   5  
      Data HidingPortable Network AquisitionVisual Secret SharingData Repair
    • by 
    •   10  
      EngineeringNeural NetworkMathematical SciencesData Security
    • by 
    •   12  
      Mechanical EngineeringMathematicsComputer ScienceComputational Complexity
    • by 
    •   7  
      EngineeringImage QualityVisual CryptographyInformation Forensics
    • by 
    •   5  
      EngineeringMathematical SciencesVisual CryptographyInformation Sciences
    • by 
    •   7  
      EngineeringComputational ComplexityEdge DetectionColor Image
    • by 
    •   4  
      Pure MathematicsVisual CryptographyElectrical And Electronic EngineeringVisual Secret Sharing
Conventional visual secret sharing (VSS) schemes hide secret images in shares that are moreover published on clarity or are decoded and stored in a digital form. The shares can appear as noise-suchlike pixels or as meaningful images, but... more
    • by 
    •   7  
      Computer ScienceImage ProcessingCryptographySteganography
In traditional VSS schemes, the size of the share image is substantially expanded since each pixel of the secret image is mapped onto a block consisting of several pixels. In addition, the quality of the reconstructed secret image is... more
    • by 
    •   5  
      EngineeringMathematical SciencesVisual CryptographyInformation Sciences
    • by 
    •   5  
      EngineeringMathematical SciencesVisual CryptographyInformation Sciences
    • by 
    •   5  
      Computational ComplexityImage QualitySecret SharingLeast Significant Bit
Visual cryptography (VC) is a technique that divides a secret image into n shares, that are distributed to the concerned participants and to decrypt, the shares are stacked to get the secret image back. The shares can cause transmission... more
    • by 
    •   5  
      SteganographyFeature ExtractionVisual Secret SharingNatural Images