Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secret image sharing schemes: A comprehensive survey
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …
an issue of utmost importance as a direct result of the rapid development of network …
Threshold changeable secret image sharing scheme based on interpolation polynomial
YX Liu, CN Yang, CM Wu, QD Sun, W Bi - Multimedia Tools and …, 2019 - Springer
In previous (k, n) secret image sharing scheme, the threshold k is decided by dealer
according to the security requirement, and this threshold value is fixed without considering …
according to the security requirement, and this threshold value is fixed without considering …
Secret image sharing scheme with lossless recovery and high efficiency
S Luo, Y Liu, X Yan, Y Yu - Signal Processing, 2023 - Elsevier
As a well-known secret image sharing scheme, Thien-and-Lin's scheme generates shadow
images of reduced size, which is beneficial for storage, transmission, and processing …
images of reduced size, which is beneficial for storage, transmission, and processing …
Scalable secret image sharing scheme with essential shadows
Y Liu, C Yang - Signal Processing: Image Communication, 2017 - Elsevier
In scalable (k, n) secret image sharing schemes, original secret image can be partially
recovered from any set of k shadows gradually, the entire image can be recovered from n …
recovered from any set of k shadows gradually, the entire image can be recovered from n …
Enhanced Boolean-based multi secret image sharing scheme
CN Yang, CH Chen, SR Cai - Journal of Systems and software, 2016 - Elsevier
Abstract Recently, Chen and Wu propose a (n, n) multi secret image sharing (MSIS) scheme
that shares n secret images into n shared images. These n shared images can be together …
that shares n secret images into n shared images. These n shared images can be together …
A construction method of (t, k, n)-essential secret image sharing scheme
Secret image sharing (SIS) is a technique to decompose a secret image into multiple
shadows distributed to the corresponding participants. Only qualified subsets of the …
shadows distributed to the corresponding participants. Only qualified subsets of the …
Essential secret image sharing scheme with the same size of shadows
P Li, CN Yang, Z Zhou - Digital Signal Processing, 2016 - Elsevier
Secret image sharing is a method to decompose a secret image into shadow images
(shadows) so that only qualified subset of shadows can be used to reconstruct the secret …
(shadows) so that only qualified subset of shadows can be used to reconstruct the secret …
Essential secret image sharing approach with same size of meaningful shares
Abstract Essential Secret Image Sharing (ESIS) is a method to decompose a secret image
into two groups of shares, where one group is essential and the other group is non …
into two groups of shares, where one group is essential and the other group is non …
Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach
CN Yang, P Li, CC Wu, SR Cai - Signal Processing: Image Communication, 2015 - Elsevier
Recently, Li et al. proposed a (t, s, k, n) essential secret image sharing (ESIS) scheme with
different importance of shadows, which has s essential shadow images and n− s non …
different importance of shadows, which has s essential shadow images and n− s non …
Secret image sharing by using multi-prime modular arithmetic
All secret image sharing (SIS) schemes are based on a finite field, on which the generation
and reconstruction can be accomplished correctly. To achieve distortionless secret images …
and reconstruction can be accomplished correctly. To achieve distortionless secret images …