• 沒有找到結果。

[PDF] Top 20 Secret image sharing with capability of share data reduction

Has 10000 "Secret image sharing with capability of share data reduction" found on our website. Below are the top 20 most common "Secret image sharing with capability of share data reduction".

Secret image sharing with capability of share data reduction

Secret image sharing with capability of share data reduction

... size of the data that must be shared, and guarantees the quality of the recovered image in the mean ...values of all the reserved coefficients except the first one 共called the DC value兲 ... See full document

6

Secret image sharing with capability of share data reduction

Secret image sharing with capability of share data reduction

... 摘要: A novel approach to secret image sharing based on a (k,n)-threshold scheme with the additional capability of share data reduction is proposed.. A secret image is first transformed[r] ... See full document

1

Secret image sharing with steganography and authentication

Secret image sharing with steganography and authentication

... to secret image sharing based on a ðk; nÞ-threshold scheme with the additional capabilities of steganography and authentication is ...A secret image is first processed into ... See full document

10

A Multi-threshold Secret Image Sharing Scheme Based on MSP

A Multi-threshold Secret Image Sharing Scheme Based on MSP

... set of the shadow images can share different secret images ...the secret image cannot be recovered without dis- tortion since all the pixels larger than 250 need to be modified to 250 in ... See full document

7

Secret multimedia information sharing with data hiding capability by simple logic operations

Secret multimedia information sharing with data hiding capability by simple logic operations

... for secret multimedia information sharing with data-hiding capability is ...pro-posed. Sharing is accomplished by transforming a set of secret data into an ... See full document

1

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability

... self-repairing of the original image data is that the data to be embedded in the carrier are often large ...here with the alpha channel as the carrier, this is not a problem because the ... See full document

12

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image with a Data Repair Capability

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image with a Data Repair Capability

... purpose of reducing the distortion. In this study, a method for authentication of document im- ages with an additional self-repair capability for fixing tam- pered image data is ... See full document

11

Secret Multimedia Information Sharing with Data Hiding  Capacity by Simple Logic Operations

Secret Multimedia Information Sharing with Data Hiding Capacity by Simple Logic Operations

... camouflage image imperceptibly to avoid attacks from ...change of the original image invisible. This kind of scheme can be regarded as the first layer of ...to share ... See full document

7

Secret Sharing with Steganographic Effects for HTML Documents

Secret Sharing with Steganographic Effects for HTML Documents

... number of secret sharing participants is ...a secret HTML which contains two text component segments, “This is a secret sharing test for ...hyperlink with hyperlink text ... See full document

7

A Data Hiding Method Based on Information Sharing  via PNG Images for Applications of Color Image

A Data Hiding Method Based on Information Sharing via PNG Images for Applications of Color Image

... new data hiding method via PNG images based on Shamir’s (k, n)-threshold secret sharing scheme is ...coefficients of the polynomial used by the Shamir’s method are taken as carriers to carry ... See full document

36

Secret Image Sharing with Reversible Steganography

Secret Image Sharing with Reversible Steganography

... content of the secret image must be ...cover image. In order to achieve these purposes, we first transform the secret pixels into the m-ary notational ... See full document

2

Secret image sharing with reversible steganography

Secret image sharing with reversible steganography

... 題名: Secret image sharing with reversible steganography 作者: Chang, Chin-Chen;Lin, Pei-Yu;Chan, Chi-Shiang 貢獻者: Department of Information Science and Applications 關鍵詞: Artificial ... See full document

1

Secret image sharing with steganography and authentication

Secret image sharing with steganography and authentication

... 題名: Secret image sharing with steganography and authentication 作者: ...Department of Information Communication 關鍵詞: Secret image ... See full document

1

Fast-weighted secret image sharing

Fast-weighted secret image sharing

... to share a secret image among n shad- ows: any t of the n shadows can recover the secret, whereas t − 1 or fewer shadows ...the secret in managers’ ...the secret, unless ... See full document

7

A hierarchical threshold secret image sharing

A hierarchical threshold secret image sharing

... the secret is shared by a set of participants partitioned into several levels, and the secret data can be reconstructed by satisfying a sequence of threshold require- ments ...examples ... See full document

9

Sharing Secret Image Based on Bit Plane

Sharing Secret Image Based on Bit Plane

... a secret sharing technique by encrypting m successively pixels to remove the problem of pixel ...continuous-tone image into a binary image and can generate the similar effect as the ... See full document

6

A covert communication method via spreadsheets by secret sharing with a self-authentication capability

A covert communication method via spreadsheets by secret sharing with a self-authentication capability

... part of the content in a cover spreadsheet, yielding a camouflage effect and generating a self-authentication ...group of the secret message extracted from a stego-spreadsheet can be blindly ... See full document

11

A Covert Communication Method via Spreadsheets by Secret Sharing with a Self-Authentication Capability

A Covert Communication Method via Spreadsheets by Secret Sharing with a Self-Authentication Capability

... property of the stego-spreadsheet when a steganalyst has the information of the probability distribution related to the ...level of the chosen numeric data of the cover ...variance ... See full document

39

Sharing a Verifiable Secret Image Using Two Shadows

Sharing a Verifiable Secret Image Using Two Shadows

... verifiable secret sharing (VSS) scheme, which not only protects a secret image but also allows users to verify the restored secret image in the revealing and verifying phase, for ... See full document

1

An Efficient Probability-based t out of n Secret Image Sharing Scheme

An Efficient Probability-based t out of n Secret Image Sharing Scheme

... concept of visual ...the secret pixels to blocks. As a result, the size of the secret image becomes larger, and the quality of the expanded secret image becomes ... See full document

1

Show all 10000 documents...