intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Image secret sharing

Xem 1-6 trên 6 kết quả Image secret sharing
  • This paper proposes a new watermarking method for digital image by composing the DWT-QIM based embedding with visual secret sharing (VSS) method. Firstly, the watermark image is separated into n shares by using the kout-of-n method, also called (k,n) visual secret sharing.

    pdf13p visystrom 22-11-2023 4 4   Download

  • In the restoration phase, for the case of dealer attendance, he can verify each shadow received using his secret key; for the case of dealer nonattendance, participants can verify each other before exchanging their shadows.

    pdf16p guernsey 28-12-2021 6 0   Download

  • Yang et al. recently developed a user-friendly image-sharing scheme that shares images using many polynomials with different primes. Yang et al. modified the least significant bit (LSB) of original pixels to identify the prime number for sharing. However, the reconstructed image retains some noise. The scheme proposed in this work uses polynomials with different primes to generate pixel shadows without adjusting the LSBs of original pixels, such that the recovery process can reconstruct a high-quality original image using the Lagrange interpolation function.

    pdf6p angicungduoc3 22-03-2020 31 1   Download

  • This work attempts to calculate the differences between pixels in a block by using the JPEG-LS median edge predictor. Given the role of this predictor, the generated differences refer to both the left pixel and its neighboring pixels, thus diminishing the values of differences and enhancing the reconstructed image quality. Experimental results demonstrated the effectiveness of using the JPEG-LS median edge predictor.

    pdf12p thithizone3 30-07-2019 18 2   Download

  • As technology progresses and as more and more personal data is digitized, there is even more of an emphasis required on data security today than there has ever been. Protecting this data in a safe and secure way which does not impede the access of an authorized authority is an immensely difficult and very interesting research problem. Many attempts have been made to solve this problem within the cryptographic community. In this book, we present one of these data security methods known as visual cryptography (VC).

    pdf144p tuanloc_do 03-12-2012 78 7   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article A Secret Image Sharing Method Using Integer Wavelet Transform

    pdf13p dauphong19 07-03-2012 48 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2