Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2019 at "Journal of Digital Imaging"
DOI: 10.1007/s10278-019-00243-x
Abstract: Information infrastructures involve the notion of a shared, open infrastructure, constituting a space where people, organizations, and technical components associate to develop an activity. The current infrastructure for medical image sharing, based on PACS/DICOM technologies,…
read more here.
Keywords:
information;
information infrastructure;
infrastructure;
image sharing ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Cluster Computing"
DOI: 10.1007/s10586-017-1345-y
Abstract: Secret image sharing is the study of sharing a secret image with several participants to prevent the malicious participant obtaining information about the secret image. Traditional methods generate meaningless shares, which are unintelligible and easily…
read more here.
Keywords:
image;
system;
secret image;
image sharing ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6202-3
Abstract: In comparison with traditional secret image sharing (SIS), extended secret image sharing (ESIS) can encrypt the secret image into several meaningful shadow images rather than noise-like shares, which both decrease enemies’ suspects and make them…
read more here.
Keywords:
extended secret;
image;
secret image;
image sharing ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6663-4
Abstract: This paper proposes an efficient (k, n)-Hybrid image sharing scheme (HISS) using non-recursive hash key based stream cipher. The sequence generated using non-linear based boolean function is used to construct the Toeplitz matrix to generate…
read more here.
Keywords:
non recursive;
image;
stream;
hybrid image ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-019-08524-x
Abstract: Boolean-operation-based secret image sharing (BSIS), which aims to encode a secret image into some shared images and discloses the original secret image later, has drawn more and more attention in academia. Since Chen and Wu…
read more here.
Keywords:
image;
multiple secret;
access structure;
secret image ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-021-10625-5
Abstract: Essential Secret Image Sharing (ESIS) is a method to decompose a secret image into two groups of shares, where one group is essential and the other group is non-essential. In this method, recovery of secret…
read more here.
Keywords:
essential secret;
secret image;
approach;
image ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2865421
Abstract: Secret image sharing (SIS) is an important technique for image protection. Several shadows are produced in SIS through scrambling pixel values and their correlations of a secret image. We can own sufficient shadows to retrieve…
read more here.
Keywords:
meaningful shadow;
image;
sis;
secret image ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3025960
Abstract: This article first proposes two types of three-dimensional (3D) fractal reference matrices. Then, a new reversible (2, 3) secret image sharing scheme based on a fractal matrix is presented. With the help of the fractal…
read more here.
Keywords:
secret image;
reversible secret;
image;
fractal matrix ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3240202
Abstract: Multi-Secret Image Sharing (MSIS) is important in information security when multiple images are shared in an unintelligible form to different participants, where the images can only be recovered using the shares from participants. This paper…
read more here.
Keywords:
system;
tex math;
inline formula;
secret image ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3139657
Abstract: In the industrial Internet of Things (IoT), large amounts of image data are collected, stored, and transmitted by low-power cooperative sensors and heterogeneous devices, such as monitoring pictures taken by surveillance cameras in intelligent transportation.…
read more here.
Keywords:
system;
industrial internet;
secret image;
internet things ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Transactions on Mobile Computing"
DOI: 10.1109/tmc.2016.2595573
Abstract: Nowadays, large volumes of multimedia data are outsourced to the cloud to better serve mobile applications. Along with this trend, highly correlated datasets can occur commonly, where the rich information buried in correlated data is…
read more here.
Keywords:
encrypted data;
image;
harnessing encrypted;
image sharing ... See more keywords