Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secret sharing: A comprehensive survey, taxonomy and applications
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …
magnificent development in information and communication technology. Likewise …
QR code as an element of educational activity
Z Deineko, N Kraievska, V Lyashenko - 2022 - openarchive.nure.ua
Анотація Educational activity is one of the directions, which in its development uses various
advanced technologies. This makes it possible to increase the attractiveness of the learning …
advanced technologies. This makes it possible to increase the attractiveness of the learning …
Visual cryptography in single-pixel imaging
Two novel visual cryptography (VC) schemes are proposed by combining VC with single-
pixel imaging (SPI) for the first time. It is pointed out that the overlap** of visual key images …
pixel imaging (SPI) for the first time. It is pointed out that the overlap** of visual key images …
Secret image sharing schemes: A comprehensive survey
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …
an issue of utmost importance as a direct result of the rapid development of network …
Improved visual secret sharing scheme for QR code applications
Y Cheng, Z Fu, B Yu - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Quick response (QR) codes have been widely used in applications, such as data storage
and high-speed machine reading. Anyone can gain access to the information stored in QR …
and high-speed machine reading. Anyone can gain access to the information stored in QR …
Biometric security through visual encryption for fog edge computing
Fog and mobile edge computing have gained considerable attention from the research and
development community. The problems related to security and privacy of biometric content …
development community. The problems related to security and privacy of biometric content …
Visual Secret Sharing Scheme for (k, n) Threshold-Based on QR Code with Multiple Decryptions
S Wan, Y Lu, X Yan, Y Wang… - … and Information Security …, 2018 - taylorfrancis.com
In this paper, a novel visual secret sharing (VSS) scheme based on QR code (VSSQR) with
(k; n) threshold is investigated. Our VSSQR exploits the error correction mechanism in the …
(k; n) threshold is investigated. Our VSSQR exploits the error correction mechanism in the …
Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism
PC Huang, CC Chang, YH Li, Y Liu - Journal of Information Security and …, 2021 - Elsevier
In recent years, QR code is popular online and offline, and it is an ideal media for secret
sharing. This paper utilizes the error correction capacity of QR code to propose an (n, n) …
sharing. This paper utilizes the error correction capacity of QR code to propose an (n, n) …
Using color QR codes for QR code secret sharing
The secret sharing scheme can share the secret image with several shares. The secure
transmission of the quick response (QR) code can be enhanced by the secret sharing …
transmission of the quick response (QR) code can be enhanced by the secret sharing …
QR-3S: A high payload QR code secret sharing system for industrial Internet of Things in 6G networks
L **ong, X Zhong, NN **ong… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The communication in a 6G-enabled network in a box (NIB) needs to meet the
characteristics of fast, convenient, and safe. Secret sharing scheme has become a hot topic …
characteristics of fast, convenient, and safe. Secret sharing scheme has become a hot topic …