Articles with "image sharing" as a keyword



Photo from wikipedia

Towards an Information Infrastructure for Medical Image Sharing

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Digital Imaging"

DOI: 10.1007/s10278-019-00243-x

Abstract: Information infrastructures involve the notion of a shared, open infrastructure, constituting a space where people, organizations, and technical components associate to develop an activity. The current infrastructure for medical image sharing, based on PACS/DICOM technologies,… read more here.

Keywords: information; information infrastructure; infrastructure; image sharing ... See more keywords
Photo by alex_andrews from unsplash

Distortion less secret image sharing scheme for Internet of Things system

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-1345-y

Abstract: Secret image sharing is the study of sharing a secret image with several participants to prevent the malicious participant obtaining information about the secret image. Traditional methods generate meaningless shares, which are unintelligible and easily… read more here.

Keywords: image; system; secret image; image sharing ... See more keywords
Photo from wikipedia

Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6202-3

Abstract: In comparison with traditional secret image sharing (SIS), extended secret image sharing (ESIS) can encrypt the secret image into several meaningful shadow images rather than noise-like shares, which both decrease enemies’ suspects and make them… read more here.

Keywords: extended secret; image; secret image; image sharing ... See more keywords
Photo from wikipedia

Hybrid image sharing scheme using non-recursive hash key based stream cipher

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6663-4

Abstract: This paper proposes an efficient (k, n)-Hybrid image sharing scheme (HISS) using non-recursive hash key based stream cipher. The sequence generated using non-linear based boolean function is used to construct the Toeplitz matrix to generate… read more here.

Keywords: non recursive; image; stream; hybrid image ... See more keywords
Photo by mybbor from unsplash

Multiple secret image sharing with general access structure

Sign Up to like & get
recommendations!
Published in 2020 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-08524-x

Abstract: Boolean-operation-based secret image sharing (BSIS), which aims to encode a secret image into some shared images and discloses the original secret image later, has drawn more and more attention in academia. Since Chen and Wu… read more here.

Keywords: image; multiple secret; access structure; secret image ... See more keywords
Photo from wikipedia

Essential secret image sharing approach with same size of meaningful shares

Sign Up to like & get
recommendations!
Published in 2021 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-021-10625-5

Abstract: Essential Secret Image Sharing (ESIS) is a method to decompose a secret image into two groups of shares, where one group is essential and the other group is non-essential. In this method, recovery of secret… read more here.

Keywords: essential secret; secret image; approach; image ... See more keywords
Photo from wikipedia

General Meaningful Shadow Construction in Secret Image Sharing

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2865421

Abstract: Secret image sharing (SIS) is an important technique for image protection. Several shadows are produced in SIS through scrambling pixel values and their correlations of a secret image. We can own sufficient shadows to retrieve… read more here.

Keywords: meaningful shadow; image; sis; secret image ... See more keywords
Photo by krakenimages from unsplash

A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3025960

Abstract: This article first proposes two types of three-dimensional (3D) fractal reference matrices. Then, a new reversible (2, 3) secret image sharing scheme based on a fractal matrix is presented. With the help of the fractal… read more here.

Keywords: secret image; reversible secret; image; fractal matrix ... See more keywords
Photo by saadahmad_umn from unsplash

An Efficient Multi-Secret Image Sharing System Based on Chinese Remainder Theorem and Its FPGA Realization

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3240202

Abstract: Multi-Secret Image Sharing (MSIS) is important in information security when multiple images are shared in an unintelligible form to different participants, where the images can only be recovered using the shares from participants. This paper… read more here.

Keywords: system; tex math; inline formula; secret image ... See more keywords
Photo by worldsbetweenlines from unsplash

RSIS: A Secure and Reliable Secret Image Sharing System Based on Extended Hamming Codes in Industrial Internet of Things

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3139657

Abstract: In the industrial Internet of Things (IoT), large amounts of image data are collected, stored, and transmitted by low-power cooperative sensors and heterogeneous devices, such as monitoring pictures taken by surveillance cameras in intelligent transportation.… read more here.

Keywords: system; industrial internet; secret image; internet things ... See more keywords
Photo from wikipedia

Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Mobile Computing"

DOI: 10.1109/tmc.2016.2595573

Abstract: Nowadays, large volumes of multimedia data are outsourced to the cloud to better serve mobile applications. Along with this trend, highly correlated datasets can occur commonly, where the rich information buried in correlated data is… read more here.

Keywords: encrypted data; image; harnessing encrypted; image sharing ... See more keywords