Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secret image sharing schemes: A comprehensive survey
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …
an issue of utmost importance as a direct result of the rapid development of network …
Utilization of secret sharing technology for secure communication: a state-of-the-art review
Cryptography is the process by which a readable message is converted into cipher-text
unintelligible to an eavesdropper. With the advent of the internet, improved network …
unintelligible to an eavesdropper. With the advent of the internet, improved network …
Two secret sharing schemes based on Boolean operations
D Wang, L Zhang, N Ma, X Li - Pattern Recognition, 2007 - Elsevier
Traditional secret sharing schemes involve complex computation. A visual secret sharing
(VSS) scheme decodes the secret without computation, but each shadow is m times as big …
(VSS) scheme decodes the secret without computation, but each shadow is m times as big …
Visual secret sharing by random grids revisited
TH Chen, KH Tsao - Pattern recognition, 2009 - Elsevier
Recently, the visual secret sharing (VSS) technique by random grids (RG), proposed by Kafri
and Keren in 1987, has drawn attention in academia again to remove the abovementioned …
and Keren in 1987, has drawn attention in academia again to remove the abovementioned …
An enhanced threshold visual secret sharing based on random grids
X Yan, X Liu, CN Yang - Journal of real-time image processing, 2018 - Springer
Random grids (RG)-based visual secret sharing (VSS) scheme can easily avoid the pixel
expansion problem as well as requires no codebook design. However, previous scheme still …
expansion problem as well as requires no codebook design. However, previous scheme still …
Property analysis of XOR-based visual cryptography
CN Yang, DS Wang - IEEE transactions on circuits and systems …, 2013 - ieeexplore.ieee.org
A (k, n) visual cryptographic scheme (VCS) encodes a secret image into n shadow images
(printed on transparencies) distributed among n participants. When any k participants …
(printed on transparencies) distributed among n participants. When any k participants …
A turtle shell-based visual secret sharing scheme with reversibility and authentication
Y Liu, CC Chang - Multimedia Tools and Applications, 2018 - Springer
Visual secret sharing (VSS), also called visual cryptography, allows a secret image to be
divided into several shares and the secret image can only be recovered through the …
divided into several shares and the secret image can only be recovered through the …
Step construction of visual cryptography schemes
F Liu, C Wu, X Lin - IEEE transactions on information forensics …, 2009 - ieeexplore.ieee.org
Two common drawbacks of the visual cryptography scheme (VCS) are the large pixel
expansion of each share image and the small contrast of the recovered secret image. In this …
expansion of each share image and the small contrast of the recovered secret image. In this …
Improving the visual quality of random grid-based visual secret sharing
X Wu, W Sun - Signal Processing, 2013 - Elsevier
Pixel expansion and visual quality of the revealed secret image are two major concerns in
visual secret sharing (VSS). Random grid (RG) is an alternative approach to solve the pixel …
visual secret sharing (VSS). Random grid (RG) is an alternative approach to solve the pixel …
Enhanced Boolean-based multi secret image sharing scheme
CN Yang, CH Chen, SR Cai - Journal of Systems and software, 2016 - Elsevier
Abstract Recently, Chen and Wu propose a (n, n) multi secret image sharing (MSIS) scheme
that shares n secret images into n shared images. These n shared images can be together …
that shares n secret images into n shared images. These n shared images can be together …