Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An overview of visual cryptography techniques
DR Ibrahim, JS Teh, R Abdullah - Multimedia Tools and Applications, 2021 - Springer
Visual cryptography is an encryption technique that decomposes secret images into multiple
shares. These shares are digitally or physically overlapped to recover the original image …
shares. These shares are digitally or physically overlapped to recover the original image …
Privacy‐preserving remote sensing images recognition based on limited visual cryptography
D Zhang, M Shafiq, L Wang… - CAAI Transactions on …, 2023 - Wiley Online Library
With the arrival of new data acquisition platforms derived from the Internet of Things (IoT),
this paper goes beyond the understanding of traditional remote sensing technologies. Deep …
this paper goes beyond the understanding of traditional remote sensing technologies. Deep …
Reversible image secret sharing
X Yan, Y Lu, L Liu, X Song - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
In reversible image secret sharing (RISS), the cover image can be recovered to some
degree, and a share can be comprehensible rather than noise-like. Reversible cover images …
degree, and a share can be comprehensible rather than noise-like. Reversible cover images …
An enhanced threshold visual secret sharing based on random grids
X Yan, X Liu, CN Yang - Journal of real-time image processing, 2018 - Springer
Random grids (RG)-based visual secret sharing (VSS) scheme can easily avoid the pixel
expansion problem as well as requires no codebook design. However, previous scheme still …
expansion problem as well as requires no codebook design. However, previous scheme still …
A common method of share authentication in image secret sharing
Because of the importance of digital images and their extensive application to digital
watermarking, block chain, access control, identity authentication, distributive storage in the …
watermarking, block chain, access control, identity authentication, distributive storage in the …
Exploiting the error correction mechanism in QR codes for secret sharing
YW Chow, W Susilo, G Yang, JG Phillips… - Information Security and …, 2016 - Springer
This paper investigates a novel approach to secret sharing using QR codes. The proposed
QR code secret sharing approach exploits the error correction mechanism inherent in the …
QR code secret sharing approach exploits the error correction mechanism inherent in the …
Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality
X Yan, S Wang, X Niu, CN Yang - Digital Signal Processing, 2015 - Elsevier
In halftone visual cryptography scheme (HVCS), a secret image can be embedded into
halftone shares with meaningful information of the cover images. Meaningful shares are …
halftone shares with meaningful information of the cover images. Meaningful shares are …
Extended capabilities for XOR-based visual cryptography
X Wu, W Sun - IEEE Transactions on Information Forensics and …, 2014 - ieeexplore.ieee.org
The XOR-based visual cryptography (VC) is a possible methodology to solve the poor visual
quality problem without darkening the background in VC. However, investigations on XOR …
quality problem without darkening the background in VC. However, investigations on XOR …
A general progressive secret image sharing construction method
X Yan, Y Lu, L Liu - Signal Processing: Image Communication, 2019 - Elsevier
Classic secret image sharing (SIS) including polynomial-based SIS, visual secret sharing
(VSS), linear congruence (LC)-based SIS and so on, generally has the shortcoming of “all-or …
(VSS), linear congruence (LC)-based SIS and so on, generally has the shortcoming of “all-or …
Visual Secret Sharing Scheme for (k, n) Threshold-Based on QR Code with Multiple Decryptions
S Wan, Y Lu, X Yan, Y Wang… - … and Information Security …, 2018 - taylorfrancis.com
In this paper, a novel visual secret sharing (VSS) scheme based on QR code (VSSQR) with
(k; n) threshold is investigated. Our VSSQR exploits the error correction mechanism in the …
(k; n) threshold is investigated. Our VSSQR exploits the error correction mechanism in the …