Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Blockchain for digital rights management
Z Ma, M Jiang, H Gao, Z Wang - Future Generation Computer Systems, 2018 - Elsevier
Online digital content service becomes more and more easily, however, free consumption
and excessive spreading without rights protection will hurt the content providers' benefits …
and excessive spreading without rights protection will hurt the content providers' benefits …
Spectral graph theory and its applications
DA Spielman - 48th Annual IEEE Symposium on Foundations …, 2007 - ieeexplore.ieee.org
Spectral graph theory is the study of the eigenvalues and eigenvectors of matrices
associated with graphs. In this tutorial, we will try to provide some intuition as to why these …
associated with graphs. In this tutorial, we will try to provide some intuition as to why these …
On the (in) security of the Fiat-Shamir paradigm
In 1986, Fiat and Shamir proposed a general method for transforming secure 3-round public-
coin identification schemes into digital signature schemes. The idea of the transformation …
coin identification schemes into digital signature schemes. The idea of the transformation …
Utilization of secret sharing technology for secure communication: a state-of-the-art review
Cryptography is the process by which a readable message is converted into cipher-text
unintelligible to an eavesdropper. With the advent of the internet, improved network …
unintelligible to an eavesdropper. With the advent of the internet, improved network …
Improvements of image sharing with steganography and authentication
CN Yang, TS Chen, KH Yu, CC Wang - Journal of Systems and software, 2007 - Elsevier
Recently, Lin and Tsai proposed an image secret sharing scheme with steganography and
authentication to prevent participants from the incidental or intentional provision of a false …
authentication to prevent participants from the incidental or intentional provision of a false …
Threshold visual secret sharing by random grids
TH Chen, KH Tsao - Journal of Systems and Software, 2011 - Elsevier
A new visual secret sharing (VSS) approach by random grids (RG-based VSS), proposed by
Kafri and Keren (1987), has drawn close attention recently. With almost all advantages of …
Kafri and Keren (1987), has drawn close attention recently. With almost all advantages of …
Fast protection of H. 264/AVC by selective encryption of CAVLC and CABAC for I and P frames
This paper presents a novel method for the protection of bitstreams of state-of-the-art video
codec H. 264/AVC. The problem of selective encryption (SE) is addressed along with the …
codec H. 264/AVC. The problem of selective encryption (SE) is addressed along with the …
Visual secret sharing by random grids revisited
TH Chen, KH Tsao - Pattern recognition, 2009 - Elsevier
Recently, the visual secret sharing (VSS) technique by random grids (RG), proposed by Kafri
and Keren in 1987, has drawn attention in academia again to remove the abovementioned …
and Keren in 1987, has drawn attention in academia again to remove the abovementioned …
A survey paper on secret image sharing schemes
OB Chanu, A Neelima - International Journal of Multimedia Information …, 2019 - Springer
With the speedy progress of network technology and internet applications, protection of
digitized data against unauthorized access and modification has become a paramount …
digitized data against unauthorized access and modification has become a paramount …
A comprehensive study of visual cryptography
J Weir, WQ Yan - Transactions on data hiding and multimedia security V, 2010 - Springer
Visual cryptography (VC) is a powerful technique that combines the notions of perfect
ciphers and secret sharing in cryptography with that of raster graphics. VC takes a binary …
ciphers and secret sharing in cryptography with that of raster graphics. VC takes a binary …