Secret sharing: A comprehensive survey, taxonomy and applications
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …
magnificent development in information and communication technology. Likewise …
Real-time medical systems based on human biometric steganography: A systematic review
In real-time medical systems, the role of biometric technology is significant in authentication
systems because it is used in verifying the identity of people through their biometric features …
systems because it is used in verifying the identity of people through their biometric features …
Research on AI security enhanced encryption algorithm of autonomous IoT systems
B Li, Y Feng, Z **ong, W Yang, G Liu - Information sciences, 2021 - Elsevier
Aiming at the security issues during the multi-types data storage and data transmission in
autonomous Internet of Things (IoT) systems, this paper proposes an AI algorithm for data …
autonomous Internet of Things (IoT) systems, this paper proposes an AI algorithm for data …
Gan-based key secret-sharing scheme in blockchain
In this article, we propose a key secret-sharing technology based on generative adversarial
networks (GANs) to address three major problems in the blockchain: 1) low security; 2) hard …
networks (GANs) to address three major problems in the blockchain: 1) low security; 2) hard …
Secret image sharing schemes: A comprehensive survey
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …
an issue of utmost importance as a direct result of the rapid development of network …
Image steganography using fractal cover and combined chaos-DNA based encryption
To address the need for secure digital image transmission an algorithm that fulfils all
prominent prerequisites of a steganography technique is developed. By incorporating the …
prominent prerequisites of a steganography technique is developed. By incorporating the …
A survey paper on secret image sharing schemes
OB Chanu, A Neelima - International Journal of Multimedia Information …, 2019 - Springer
With the speedy progress of network technology and internet applications, protection of
digitized data against unauthorized access and modification has become a paramount …
digitized data against unauthorized access and modification has become a paramount …
Multiple share creation with optimal hash function for image security in wsn aid of ogwo
Visual share creation, with a security model, verifies the secret data transmitted by the
sender. It uses human vision to decrypt the encrypted images without complex algorithms for …
sender. It uses human vision to decrypt the encrypted images without complex algorithms for …
A secure cryptographic cloud communication using DNA cryptographic technique
S Goyat, S Jain - 2016 International Conference on Inventive …, 2016 - ieeexplore.ieee.org
The main aim of the proposed work is to design a secure cloud storage and data distribution
platform for the open cloud (public cloud). This platform offers the secure communication …
platform for the open cloud (public cloud). This platform offers the secure communication …
A new diffusion and substitution based cryptosystem for securing medical image applications
L Mancy, SMC Vigila - International Journal of Electronic …, 2018 - inderscienceonline.com
Due to the rising privilege for tele-health facilities have sophisticated responsiveness in the
usage of medicinal image safeguard proficiency. It mainly compact with patient records that …
usage of medicinal image safeguard proficiency. It mainly compact with patient records that …