Adaptive and blind watermarking scheme based on optimal SVD blocks selection
To protect the ownership of the digital products, a novel adaptive and blind watermarking
scheme is designed. Firstly, the underlying reason of image quality degradation in singular …
scheme is designed. Firstly, the underlying reason of image quality degradation in singular …
An efficient and robust zero watermarking algorithm
J Yang, K Hu, X Wang, H Wang, Q Liu… - Multimedia Tools and …, 2022 - Springer
To improve the resistance to geometric rotation attacks and to solve the problem of high
computational complexity of existing watermarking algorithms, a novel efficient and robust …
computational complexity of existing watermarking algorithms, a novel efficient and robust …
Lossless progressive secret sharing for grayscale and color images
A new technique on progressive secret sharing is presented. The proposed method offers
two different approaches on converting a secret image into a set of shared images. The first …
two different approaches on converting a secret image into a set of shared images. The first …
Overcoming security limitations of secret share techniques: the nested secret share
Secret Share (SS) is becoming a very hot topic within the scientific community. It allows us to
split a secret into fragments and to share them among parties in such a way that a subset …
split a secret into fragments and to share them among parties in such a way that a subset …
Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication
H Shi, Y Wang, Y Li, Y Ren, C Guo - Multimedia Tools and Applications, 2021 - Springer
Medical images are widely used in telemedicine, sharing and electronic transmission
between hospitals. While enjoying convenience, medical images also face privacy …
between hospitals. While enjoying convenience, medical images also face privacy …
On the applicability of secret share algorithms for saving data on iot, edge and cloud devices
A common practice to store data is to use remote Cloud-based storage systems. However,
storing files in remote services can arise privacy and security issues, for example, they can …
storing files in remote services can arise privacy and security issues, for example, they can …
On the applicability of secret share algorithms for osmotic computing
Osmotic Computing (OC) is an innovative computation paradigm that runs services on
Cloud, Edge, and Internet of Things (IoT) resources based on their workload. Services are …
Cloud, Edge, and Internet of Things (IoT) resources based on their workload. Services are …
Visual Multi-Secrets Sharing Scheme Based on Random Grid
J GAO, H YUE, J CAO - 电子与信息学报, 2022 - jeit.ac.cn
In order to improve the restoration effect of Visual Secret Sharing (VSS), a visual multi-secret
sharing scheme based on random grid is proposed. By using a multi secret image sharing …
sharing scheme based on random grid is proposed. By using a multi secret image sharing …
Visual Multi-Secrets Sharing Scheme Based on Random Grid
G Juntao, Y Hao, C **g - 电子与信息学报, 2022 - jeit.ac.cn
In order to improve the restoration effect of Visual Secret Sharing (VSS), a visual multi-secret
sharing scheme based on random grid is proposed. By using a multi secret image sharing …
sharing scheme based on random grid is proposed. By using a multi secret image sharing …
TEKNOLOGI WATERMARKING UNTUK MENDUKUNG KEAMANAN SIBER DI INDONESIA
D Rosiyadi - 2024 - penerbit.brin.go.id
Saat ini, teknologi informasi merupakan suatu hal utama dalam menunjang semua aktifitas
yang dilakukan oleh perorangan, masyarakat dan organisasi atau lembaga. Dalam …
yang dilakukan oleh perorangan, masyarakat dan organisasi atau lembaga. Dalam …