Articles with "secret image" as a keyword



Photo by alex_andrews from unsplash

Distortion less secret image sharing scheme for Internet of Things system

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-1345-y

Abstract: Secret image sharing is the study of sharing a secret image with several participants to prevent the malicious participant obtaining information about the secret image. Traditional methods generate meaningless shares, which are unintelligible and easily… read more here.

Keywords: image; system; secret image; image sharing ... See more keywords
Photo from wikipedia

A novel multiple-level secret image sharing scheme

Sign Up to like & get
recommendations!
Published in 2017 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-017-4512-5

Abstract: In this paper, a novel multiple-level secret image sharing scheme is proposed, which achieves the additional steganography, the authentication, and the scalable abilities. The key idea is that the secret image is revealed at different… read more here.

Keywords: image; novel multiple; multiple level; secret image ... See more keywords
Photo from wikipedia

Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6202-3

Abstract: In comparison with traditional secret image sharing (SIS), extended secret image sharing (ESIS) can encrypt the secret image into several meaningful shadow images rather than noise-like shares, which both decrease enemies’ suspects and make them… read more here.

Keywords: extended secret; image; secret image; image sharing ... See more keywords
Photo by arnosenoner from unsplash

XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-08351-0

Abstract: Quick response (QR) codes are becoming increasingly popular in various areas of life due to the advantages of the error correction capacity, the ability to be scanned quickly and the capacity to contain meaningful content.… read more here.

Keywords: image; visual secret; secret image; meaningful shadows ... See more keywords
Photo by mybbor from unsplash

Multiple secret image sharing with general access structure

Sign Up to like & get
recommendations!
Published in 2020 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-08524-x

Abstract: Boolean-operation-based secret image sharing (BSIS), which aims to encode a secret image into some shared images and discloses the original secret image later, has drawn more and more attention in academia. Since Chen and Wu… read more here.

Keywords: image; multiple secret; access structure; secret image ... See more keywords
Photo from wikipedia

Essential secret image sharing approach with same size of meaningful shares

Sign Up to like & get
recommendations!
Published in 2021 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-021-10625-5

Abstract: Essential Secret Image Sharing (ESIS) is a method to decompose a secret image into two groups of shares, where one group is essential and the other group is non-essential. In this method, recovery of secret… read more here.

Keywords: essential secret; secret image; approach; image ... See more keywords
Photo by campaign_creators from unsplash

A two-level secure data hiding algorithm for video steganography

Sign Up to like & get
recommendations!
Published in 2019 at "Multidimensional Systems and Signal Processing"

DOI: 10.1007/s11045-018-0568-2

Abstract: Sensitive data is exchanged frequently through wired or wireless communication that are vulnerable to unauthorized interception. Cryptography is a solution to overcome this issue, but once decrypted the information secrecy does not exist. Apart from… read more here.

Keywords: video; data hiding; two level; secret image ... See more keywords
Photo from wikipedia

General Meaningful Shadow Construction in Secret Image Sharing

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2865421

Abstract: Secret image sharing (SIS) is an important technique for image protection. Several shadows are produced in SIS through scrambling pixel values and their correlations of a secret image. We can own sufficient shadows to retrieve… read more here.

Keywords: meaningful shadow; image; sis; secret image ... See more keywords
Photo by krakenimages from unsplash

A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3025960

Abstract: This article first proposes two types of three-dimensional (3D) fractal reference matrices. Then, a new reversible (2, 3) secret image sharing scheme based on a fractal matrix is presented. With the help of the fractal… read more here.

Keywords: secret image; reversible secret; image; fractal matrix ... See more keywords
Photo by saadahmad_umn from unsplash

An Efficient Multi-Secret Image Sharing System Based on Chinese Remainder Theorem and Its FPGA Realization

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3240202

Abstract: Multi-Secret Image Sharing (MSIS) is important in information security when multiple images are shared in an unintelligible form to different participants, where the images can only be recovered using the shares from participants. This paper… read more here.

Keywords: system; tex math; inline formula; secret image ... See more keywords
Photo by worldsbetweenlines from unsplash

RSIS: A Secure and Reliable Secret Image Sharing System Based on Extended Hamming Codes in Industrial Internet of Things

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3139657

Abstract: In the industrial Internet of Things (IoT), large amounts of image data are collected, stored, and transmitted by low-power cooperative sensors and heterogeneous devices, such as monitoring pictures taken by surveillance cameras in intelligent transportation.… read more here.

Keywords: system; industrial internet; secret image; internet things ... See more keywords