... Brickell and Stinson [5] studied a perfect secret sharing scheme for graph-based access structure F where the monotone-increasing access structure F contains the pairs of partic[r] ...

10

... Brick- ell and Stinson studied a perfect secret sharing scheme for a graph-based structure where the monotone-increasing access structure F contains the pairs of p[r] ...

7

... threshold **secret**-**sharing** ...access **structures** **based** on graphs and studied their optimal information ...of **secret** **sharing**. We are motivated to construct better ...

12

... perfect **secret**-**sharing** scheme is a method of distributing a **secret** among a set of participants such that only qualified subsets of participants can recover the **secret** and the joint shares of ...

10

... efﬁcient **secret** **sharing** scheme **for** every given ac- cess ...up **secret** image **sharing** **schemes** with generalized access **structures** has been lar- gely ignored by researchers in ...

7

... XENIX **for** IBM, Federal Sector Division, Gaithersburg, Maryland, ...consultant **for** the Com- puter and Communications Laboratory, Industrial Technology Re- search Institute, Taiwan, in the area of network ...

11

... Perfect Secret Sharing Schemes 89 In this paper, we propose some recursive constructions for perfect secret sharing schemes with access structures of constant rank.. Sti[r] ...

10

... generalized **secret** **sharing** scheme that realizes an ordered access structure, in which the participants of a qualified subset can reconstruct the shared **secret** only if they follow the sequence of ...

3

... a **secret** **sharing** technique by encrypting m successively pixels to remove the problem of pixel ...halftone **secret** image is firstly divided into non-overlapping sections, in which every section ...

6

... visual **secret** **sharing** (VSS) scheme was first proposed by Noar and Shamir in ...a **secret** image into several meaningless images, called shadows, such that certain qualified subsets of shadows can ...

8

... scheme was first proposed by Naor and Shamir in 1994; many secret sharing schemes were published afterward; one of them, the color images of hierarchical multiple visual secret shari[r] ...

15

... challenge **for** mobile devices that have limited computational ...scheme **based** on **secret** **sharing** **for** mobile ...and **secret** **sharing** technology, we generate the cooperative ...

10

... Scheme **for** Threshold Multi-**Secret** **Sharing** 作者: Chan, ...theorem;Distinctness;Entropy;Idealness;Multi-**secret** **sharing** scheme;Perfectness;The Shamir (t, n)-threshold **secret** ...

1

... a **secret** HTML document are the components that can be displayed or be accessed on browsers, it is proposed in this study to share these components among participants of the **secret** HTML document by the ...

7

... DEFINITION 2. A (k, n) NEVSS scheme can be shown as two collections C 0 and C 1 consisting of n λ and n γ n × 1 matrices, respectively. When **sharing** a white (resp. black) pixel, the dealer first randomly chooses ...

12

... LQ WKLV VWXG\ 7KH PHGLFDO LPDJH DQG WKH ZDWHUPDUN. VKRZQLQ)LJVDDQGDUHVSHFWLYHO\ZHUHXVHGLQWKH[r] ...

13

... scheme **for** gray- level images **based** on image **secret** **sharing** and wavelet transformation is proposed in this ...a **secret** image generation phase and a watermark retrieval ...the ...

6

... the **secret** pixels to blocks. As a result, the size of the **secret** image becomes larger, and the quality of the expanded **secret** image becomes ...visual **secret** **sharing** scheme, where the ...

1

... A share spanning tree that connects the root node (the user that recreates the secret under consideration) to some other nodes such that its vertices hold all [r] ...

19

... image, **secret** **sharing**, data hiding, PNG ...methods **for** document image authentication [1]–[3] to ensure the integrity and authenticity of digital document images is ...useful **for** authentication ...

6