Adaptive and blind watermarking scheme based on optimal SVD blocks selection

AW Luo, LH Gong, NR Zhou, WP Zou - Multimedia Tools and Applications, 2020 - Springer
To protect the ownership of the digital products, a novel adaptive and blind watermarking
scheme is designed. Firstly, the underlying reason of image quality degradation in singular …

An efficient and robust zero watermarking algorithm

J Yang, K Hu, X Wang, H Wang, Q Liu… - Multimedia Tools and …, 2022 - Springer
To improve the resistance to geometric rotation attacks and to solve the problem of high
computational complexity of existing watermarking algorithms, a novel efficient and robust …

Lossless progressive secret sharing for grayscale and color images

H Prasetyo, CH Hsia - Multimedia Tools and Applications, 2019 - Springer
A new technique on progressive secret sharing is presented. The proposed method offers
two different approaches on converting a secret image into a set of shared images. The first …

Overcoming security limitations of secret share techniques: the nested secret share

A Galletta, J Taheri, M Fazio, A Celesti… - 2021 IEEE 20th …, 2021 - ieeexplore.ieee.org
Secret Share (SS) is becoming a very hot topic within the scientific community. It allows us to
split a secret into fragments and to share them among parties in such a way that a subset …

Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication

H Shi, Y Wang, Y Li, Y Ren, C Guo - Multimedia Tools and Applications, 2021 - Springer
Medical images are widely used in telemedicine, sharing and electronic transmission
between hospitals. While enjoying convenience, medical images also face privacy …

On the applicability of secret share algorithms for saving data on iot, edge and cloud devices

A Galletta, J Taheri, M Villari - 2019 international conference on …, 2019 - ieeexplore.ieee.org
A common practice to store data is to use remote Cloud-based storage systems. However,
storing files in remote services can arise privacy and security issues, for example, they can …

On the applicability of secret share algorithms for osmotic computing

A Galletta, M Fazio, A Celesti… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Osmotic Computing (OC) is an innovative computation paradigm that runs services on
Cloud, Edge, and Internet of Things (IoT) resources based on their workload. Services are …

Visual Multi-Secrets Sharing Scheme Based on Random Grid

J GAO, H YUE, J CAO - 电子与信息学报, 2022 - jeit.ac.cn
In order to improve the restoration effect of Visual Secret Sharing (VSS), a visual multi-secret
sharing scheme based on random grid is proposed. By using a multi secret image sharing …

Visual Multi-Secrets Sharing Scheme Based on Random Grid

G Juntao, Y Hao, C **g - 电子与信息学报, 2022 - jeit.ac.cn
In order to improve the restoration effect of Visual Secret Sharing (VSS), a visual multi-secret
sharing scheme based on random grid is proposed. By using a multi secret image sharing …

TEKNOLOGI WATERMARKING UNTUK MENDUKUNG KEAMANAN SIBER DI INDONESIA

D Rosiyadi - 2024 - penerbit.brin.go.id
Saat ini, teknologi informasi merupakan suatu hal utama dalam menunjang semua aktifitas
yang dilakukan oleh perorangan, masyarakat dan organisasi atau lembaga. Dalam …