... simplify the proposed scheme, we used a simple 3-LSB substitu- tion to embed shadow data into the cover ...Since the corre- sponding shadow data are real numbers, we divided these shadow data ...
... hierarchical threshold characteristic as compared with the existing secret image sharing ...compares the functionality of the proposed scheme with that of related ...2, ...
... and Lin 关Comput. and Graphics 26共5兲, 765–770 共2002兲兴 proposed a thresholdscheme to share a secret image among n shad- ows: any t of then shadows can recover ...
... (3) sharingthen shadows among n cover ...and secret image quality preservation effects and to limit the size of each shadow image down to 1/t of that of the ...
... presented the concept of visual ...down the same track: to expand thesecret pixels to ...result, the size of thesecret image becomes larger, and the quality of ...
... In the paper [Ift06], the compartmented access structure was studied where the users are as- signed to different groups and share thesecret in two levels, the first level is ...
... (2,2) verifiablesecretsharing (VSS) scheme, which not only protects a secret image but also allows users to verify the restored secret image in the revealing and ...
... Abstract The concept of visual secretsharing (VSS) scheme was first proposed by Noar and Shamir in ...a secret image into several meaningless images, called shadows, such that certain ...
... proposed threshold proxy signature schemes have been based on discrete logarithms required for a protocol to generate and verify a shared secret among the proxy ...for the proxy signers ...
... With the progress of the mobile communication technology and the popularity of the handheld de- vices, mobile commerce is of great importance ...When the requested services need to be ...
... considered the weighted thresholdsecret-sharing ...is the case when every participant is given a weight depending on his or her position in an ...in the access ...
... ABSTRACT The authors propose a novel generalized secretsharingscheme that realizes an ordered access structure, in which the participants of a qualified subset can reconstruct ...
... discuss the security of our scheme. During every translating period, the previous shadow is changed by adding a random number which is generated from k selected nodes, the same as table C, and ...
... protection scheme for gray- level images based on image secretsharing and wavelet transformation is proposed in this ...paper. Thescheme contains a secret image ...