• 沒有找到結果。

[PDF] Top 20 On the (2,2) Visual Multi-Secret Sharing Schemes

Has 10000 "On the (2,2) Visual Multi-Secret Sharing Schemes" found on our website. Below are the top 20 most common "On the (2,2) Visual Multi-Secret Sharing Schemes".

On the (2,2) Visual Multi-Secret Sharing Schemes

On the (2,2) Visual Multi-Secret Sharing Schemes

... Abstract The concept of visual secret sharing (VSS) scheme was first proposed by Noar and Shamir in ...a secret image into several meaningless images, called shadows, such that certain ... See full document

8

Multi-level visual secret sharing scheme with Smooth-Looking

Multi-level visual secret sharing scheme with Smooth-Looking

... - Visual secret sharing - Visual secret sharing schemes Classification code:943 Mechanical and Miscellaneous Measuring Instruments - 942 Electric and Electronic Measuring ... See full document

2

A Study of Bit-level Processing Based on Color  Imagines of Hierarchical Multiple Visual Secret Sharing Schemes and Applications

A Study of Bit-level Processing Based on Color Imagines of Hierarchical Multiple Visual Secret Sharing Schemes and Applications

... Young-Chang Hou 於 2003 年根據 以往視覺密碼的研究,加上半色調技術及 分色原理 C、M、Y 顏料三原色,再對其 子影像做處理,提出灰階影像和彩色影像 的視覺密碼作法[8],和傳統上的黑白影像 視覺密碼模型一樣,將機密影像上的每一 個像素擴展至分享影像上的 2×2 區塊,而 區塊中皆保持 2 個色點的狀態。它不但延 續了黑白視覺密碼直接利用視覺系統解 ... See full document

15

New Visual Secret Sharing Schemes With Non-Expansible Shadow Size Using Non-binary Sub Pixel

New Visual Secret Sharing Schemes With Non-Expansible Shadow Size Using Non-binary Sub Pixel

... When sharing a white (resp. black) pixel, the dealer first randomly chooses one column matrix in C 0 ...shadow. The chosen matrix defines the gray level of one sub pixel in every one of ... See full document

12

A Multi-threshold Secret Image Sharing Scheme Based on MSP

A Multi-threshold Secret Image Sharing Scheme Based on MSP

... simplify the proposed scheme, we used a simple 3-LSB substitu- tion to embed shadow data into the cover ...Since the corre- sponding shadow data are real numbers, we divided these shadow data into ... See full document

7

Secret sharing schemes for graph-based prohibited structures

Secret sharing schemes for graph-based prohibited structures

... Brickell and Stinson [5] studied a perfect secret sharing scheme for graph-based access structure F where the monotone-increasing access structure F contains the pairs of partic[r] ... See full document

10

A Scheme for Threshold Multi-Secret Sharing

A Scheme for Threshold Multi-Secret Sharing

... Threshold Multi-Secret Sharing 作者: Chan, ...theorem;Distinctness;Entropy;Idealness;Multi-secret sharing scheme;Perfectness;The Shamir (t, n)-threshold secret ... See full document

1

On Optimal Time-Sharing Schemes for Multi-Period HEN Designs

On Optimal Time-Sharing Schemes for Multi-Period HEN Designs

... calculate the minimum heating and cooling requirements for a heat- exchanger network, this study presents a sharing strategy for the design of multi-period heat-exchanger network where ... See full document

15

New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures

New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures

... considered the weighted threshold secret-sharing ...is the case when every participant is given a weight depending on his or her position in an ...in the access structure if and ... See full document

12

Constructing perfect secret sharing schemes for general and uniform access structures

Constructing perfect secret sharing schemes for general and uniform access structures

... received the M.S. and Ph.D. degrees in electrical engineering from the University of Maryland, College Park, in 1986 and 1991, ...with the Department of Computer Science and Informa- tion ... See full document

11

An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme

An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme

... verifiable multi-secret sharing (VMSS) scheme based on the factorization problem and the discrete logarithm modulo a large composite ...scheme, the dealer can arbitrarily ... See full document

10

Sharing Visual Multi-secrets Using Circle Shares

Sharing Visual Multi-secrets Using Circle Shares

... technology, the same set of shares can be embedded with many sets of secret messages after one of the shares is rotated at different ...However, the used share is rectangle so that only four ... See full document

1

Self-Verifying Visual Secret Sharing Using Error Diffusion and Interpolation Techniques

Self-Verifying Visual Secret Sharing Using Error Diffusion and Interpolation Techniques

... self-verifying visual secret sharing scheme, which can be applied to both grayscale and color ...images. The first, considered to be the host image, is created by directly applying a ... See full document

1

A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy

A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy

... reconstructed grayscale image quality than Wang et al.'s scheme without significantly increasing computational complexity, we apply the voting strategy and the least significant bits a[r] ... See full document

1

An efficient construction of perfect secret sharing schemes for graph-based structures

An efficient construction of perfect secret sharing schemes for graph-based structures

... Brick- ell and Stinson studied a perfect secret sharing scheme for a graph-based structure where the monotone-increasing access structure F contains the pairs of p[r] ... See full document

7

The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures

The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures

... perfect secret-sharing scheme is a method of distributing a secret among a set of participants such that only qualified subsets of participants can recover the secret and the ... See full document

10

A Multi-Use Secure and Efficient Multi-Secret Images Sharing Scheme for General Access Structure

A Multi-Use Secure and Efficient Multi-Secret Images Sharing Scheme for General Access Structure

... Abstract―Multiple secret images sharing scheme deals with the problem that how to secretly distribute several secret images among a group of participants at the same time, and ... See full document

9

Cryptanalysis of and improvement on the Hwang–Chen multi-proxy multi-signature schemes

Cryptanalysis of and improvement on the Hwang–Chen multi-proxy multi-signature schemes

... attack on the Hwang–Chen schemes. Let the proxy sign- er P 1 be malicious throughout this ...a multi-proxy multi-signature for a secret message M 0 while participating ... See full document

11

Fast-weighted secret image sharing

Fast-weighted secret image sharing

... is the image revealed by Figs. 3 共a兲 –3 共d兲 , and the revealed image is identical to ...compares the execution time in the weighted secret image–sharing phase using Thien and ... See full document

7

A hierarchical threshold secret image sharing

A hierarchical threshold secret image sharing

... scheme, the secret is shared by a set of participants partitioned into several levels, and the secret data can be reconstructed by satisfying a sequence of threshold require- ments ...from ... See full document

9

Show all 10000 documents...