Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secret image sharing schemes: A comprehensive survey
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …
an issue of utmost importance as a direct result of the rapid development of network …
Reversible image secret sharing
X Yan, Y Lu, L Liu, X Song - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
In reversible image secret sharing (RISS), the cover image can be recovered to some
degree, and a share can be comprehensible rather than noise-like. Reversible cover images …
degree, and a share can be comprehensible rather than noise-like. Reversible cover images …
Privacy-preserving in healthcare blockchain systems based on lightweight message sharing
Electronic medical records (EMRs) are extremely important for patients' treatment, doctors'
diagnoses, and medical technology development. In recent years, the distributed healthcare …
diagnoses, and medical technology development. In recent years, the distributed healthcare …
A common method of share authentication in image secret sharing
Because of the importance of digital images and their extensive application to digital
watermarking, block chain, access control, identity authentication, distributive storage in the …
watermarking, block chain, access control, identity authentication, distributive storage in the …
A general progressive secret image sharing construction method
X Yan, Y Lu, L Liu - Signal Processing: Image Communication, 2019 - Elsevier
Classic secret image sharing (SIS) including polynomial-based SIS, visual secret sharing
(VSS), linear congruence (LC)-based SIS and so on, generally has the shortcoming of “all-or …
(VSS), linear congruence (LC)-based SIS and so on, generally has the shortcoming of “all-or …
Visual Secret Sharing Scheme for (k, n) Threshold-Based on QR Code with Multiple Decryptions
S Wan, Y Lu, X Yan, Y Wang… - … and Information Security …, 2018 - taylorfrancis.com
In this paper, a novel visual secret sharing (VSS) scheme based on QR code (VSSQR) with
(k; n) threshold is investigated. Our VSSQR exploits the error correction mechanism in the …
(k; n) threshold is investigated. Our VSSQR exploits the error correction mechanism in the …
APCAS: Autonomous privacy control and authentication sharing in social networks
Recently, the increasing development of social networks has brought about many privacy-
related issues. Because users (participants) have different privacy sharing behaviors when …
related issues. Because users (participants) have different privacy sharing behaviors when …
Contrast optimization for size invariant visual cryptography scheme
Visual cryptography scheme (VCS) serves as an effective tool in image security. Size-
invariant VCS (SI-VCS) can solve the pixel expansion problem in traditional VCS. On the …
invariant VCS (SI-VCS) can solve the pixel expansion problem in traditional VCS. On the …
Chinese remainder theorem-based two-in-one image secret sharing with three decoding options
X Yan, Y Lu, L Liu, J Liu, G Yang - Digital Signal Processing, 2018 - Elsevier
Two-in-one image secret sharing (ISS) with more decoding options has more applicable
scenarios than that with only one decoding option. Conventional two-in-one ISS methods …
scenarios than that with only one decoding option. Conventional two-in-one ISS methods …
Feature selection for image steganalysis using binary bat algorithm
F Liu, X Yan, Y Lu - IEEE Access, 2019 - ieeexplore.ieee.org
Steganography is to hide secret information in a normal cover, so that the secret information
cannot be detected. With the rapid development of steganography, it's more and more …
cannot be detected. With the rapid development of steganography, it's more and more …