Articles with "secret images" as a keyword



Photo by krakenimages from unsplash

Double layer secure secret images sharing scheme for biometrics

Sign Up to like & get
recommendations!
Published in 2021 at "Distributed and Parallel Databases"

DOI: 10.1007/s10619-021-07362-x

Abstract: Biometric strategy is primarily followed for authentication which incorporates the distinct recognition of the individual depending on their physical or behavioral features. Among all the biometrics techniques, ‘Iris scanning’ is touted to be the most… read more here.

Keywords: secure secret; secret sharing; scheme; secure ... See more keywords
Photo by krakenimages from unsplash

Multilevel Strong Auxiliary Network for Enhancing Feature Representation to Protect Secret Images

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2021.3123233

Abstract: Image data play an important role in the network information, however, some images containing sensitive or confidential information are easy to attract the attention of malicious attackers. On the basis of deep learning and data… read more here.

Keywords: network; multilevel strong; protect secret; secret image ... See more keywords
Photo by krakenimages from unsplash

An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms

Sign Up to like & get
recommendations!
Published in 2022 at "International Journal of Distributed Sensor Networks"

DOI: 10.1177/15501329221084223

Abstract: This article proposes an efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms, which includes an encryption and a decryption schemes for gray-scale and color secret images. The encryption scheme aims to encrypt secret images… read more here.

Keywords: based visual; secret images; scheme; visual cryptography ... See more keywords
Photo by strong18philip from unsplash

A Novel General (n, n)-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain

Sign Up to like & get
recommendations!
Published in 2022 at "Entropy"

DOI: 10.3390/e24030318

Abstract: (k,n)-threshold secret image sharing (SIS) protects an image by dividing it into n shadow images. The secret image will be recovered as we gather k or more shadow images. In complex networks, the security, robustness… read more here.

Keywords: threshold; secret images; multiple secret; information hiding ... See more keywords