• 沒有找到結果。

[PDF] Top 20 Secret image sharing with steganography and authentication

Has 10000 "Secret image sharing with steganography and authentication" found on our website. Below are the top 20 most common "Secret image sharing with steganography and authentication".

Secret image sharing with steganography and authentication

Secret image sharing with steganography and authentication

... to secret image sharing based on a ðk; nÞ-threshold scheme with the additional capabilities of steganography and authentication is ...A secret image is first ... See full document

10

Secret image sharing with steganography and authentication

Secret image sharing with steganography and authentication

... 題名: Secret image sharing with steganography and authentication 作者: ...關鍵詞: Secret image sharing;Steganography;Authentication;Camouflage ... See full document

1

Secret image sharing with reversible steganography

Secret image sharing with reversible steganography

... 題名: Secret image sharing with reversible steganography 作者: Chang, Chin-Chen;Lin, Pei-Yu;Chan, Chi-Shiang 貢獻者: Department of Information Science and Applications 關鍵詞: Artificial ... See full document

1

Secret Image Sharing with Reversible Steganography

Secret Image Sharing with Reversible Steganography

... the secret image must be ...cover image. In order to achieve these purposes, we first transform the secret pixels into the m-ary notational ... See full document

2

Sharing Secrets in Stego Images with Authentication

Sharing Secrets in Stego Images with Authentication

... Lin and Tsai and Yang et al. proposed secret image sharing schemes with steganography and authentication, which divide a secret image into the ... See full document

1

Secret image sharing with capability of share data reduction

Secret image sharing with capability of share data reduction

... shared, and guarantees the quality of the recovered image in the mean ...for sharing is re- stricted to be just the DC value, and so the amount of information to be shared and that of ... See full document

6

Fast-weighted secret image sharing

Fast-weighted secret image sharing

... 1 and Shamir 2 first proposed the secret sharing scheme in 1979, ...a secret number into n shad- ows and each of n participants held one ...The secret number could be ... See full document

7

A hierarchical threshold secret image sharing

A hierarchical threshold secret image sharing

... compared with the existing secret image sharing ...scheme with that of related ...purpose and provided the satisfactory quality of shadow ...the secret image can be ... See full document

9

Sharing Secret Image Based on Bit Plane

Sharing Secret Image Based on Bit Plane

... gray-level image into a halftone one, which will limit the applicability of secret sharing technique ...Lukac and Plataniotis [7] proposed a new secret sharing me- thod based on ... See full document

6

A covert communication method via spreadsheets by secret sharing with a self-authentication capability

A covert communication method via spreadsheets by secret sharing with a self-authentication capability

... effect and generating a self-authentication ...the secret message extracted from a stego-spreadsheet can be blindly authenticated by check- ing the results computed from all the k + 1 possible ... See full document

11

A Covert Communication Method via Spreadsheets by Secret Sharing with a Self-Authentication Capability

A Covert Communication Method via Spreadsheets by Secret Sharing with a Self-Authentication Capability

... Scores2, and Scores3 with the scatter level from high to low were tested further in our experiments using the same setting of ...above and the corresponding statistics is shown in Table ...Scores2 ... See full document

39

Sharing and hiding secret images with size constraint

Sharing and hiding secret images with size constraint

... stego image was 2=t or 4=t of that of the secret ...stego image (which contains the hidden shadow) is still about 1=t of that of the secret ...the sharing phase in ...the secret ... See full document

9

Authentication and recovery of an image by sharing and lattice-embedding

Authentication and recovery of an image by sharing and lattice-embedding

... two-layer sharing. Compared with previously reported methods, our specialty is that the tampered region can be recovered as long as the percentage of the tampered blocks does not ex- ceed a pre-defined ... See full document

14

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability

... original image data is that the data to be embedded in the carrier are often large ...here with the alpha channel as the carrier, this is not a problem because the cover image that we deal ... See full document

12

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image with a Data Repair Capability

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image with a Data Repair Capability

... for authentication of document im- ages with an additional self-repair capability for fixing tam- pered image data is ...cover image is as- sumed to be a binary-like grayscale image ... See full document

11

A Multi-threshold Secret Image Sharing Scheme Based on MSP

A Multi-threshold Secret Image Sharing Scheme Based on MSP

... part and the decimal part, to deal ...the secret image can be reconstructed ...images and enlarge the embedding capac- ...associated with this ... See full document

7

Authentication of Binary Document Images in PNG Format Based on A  Secret Sharing Technique

Authentication of Binary Document Images in PNG Format Based on A Secret Sharing Technique

... — image authentication, binary document image, secret sharing, data hiding, PNG ...tamper with the content of a digital image ...document image ... See full document

6

Secret Sharing with Steganographic Effects for HTML Documents

Secret Sharing with Steganographic Effects for HTML Documents

... of secret sharing participants is two. Figure 3 shows a secret HTML which contains two text component segments, “This is a secret sharing test for ...top and at the bottom, a ... See full document

7

A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation

A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation

... on image secret sharing and wavelet transformation is proposed in this ...a secret image generation phase and a watermark retrieval ...host image using the discrete ... See full document

6

A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering

A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering

... distribution, and reproduction in any medium, provided the original work is properly ...Internet and computer technologies. However, tampering with digital images is easy to get, since modern ... See full document

17

Show all 10000 documents...