Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Extended capabilities for visual cryptography
An extended visual cryptography scheme (EVCS), for an access structure (Γ Qual, Γ Forb)
on a set of n participants, is a technique to encode n images in such a way that when we …
on a set of n participants, is a technique to encode n images in such a way that when we …
Secret image sharing with steganography and authentication
CC Lin, WH Tsai - Journal of Systems and software, 2004 - Elsevier
A novel approach to secret image sharing based on a (k, n)-threshold scheme with the
additional capabilities of steganography and authentication is proposed. A secret image is …
additional capabilities of steganography and authentication is proposed. A secret image is …
Secret image sharing schemes: A comprehensive survey
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …
an issue of utmost importance as a direct result of the rapid development of network …
New visual secret sharing schemes using probabilistic method
CN Yang - Pattern Recognition Letters, 2004 - Elsevier
Visual secret sharing (VSS) scheme is a perfect secure method that protects a secret image
by breaking it into shadow images (called shadows). Unlike other threshold schemes, VSS …
by breaking it into shadow images (called shadows). Unlike other threshold schemes, VSS …
Two secret sharing schemes based on Boolean operations
D Wang, L Zhang, N Ma, X Li - Pattern Recognition, 2007 - Elsevier
Traditional secret sharing schemes involve complex computation. A visual secret sharing
(VSS) scheme decodes the secret without computation, but each shadow is m times as big …
(VSS) scheme decodes the secret without computation, but each shadow is m times as big …
Image encryption by random grids
SJ Shyu - Pattern recognition, 2007 - Elsevier
A random grid in this paper is a transparency comprising a two-dimensional array of pixels
that are either transparent or opaque determined in a totally random way. We design …
that are either transparent or opaque determined in a totally random way. We design …
Visual cryptography for gray-level images by dithering techniques
CC Lin, WH Tsai - Pattern Recognition Letters, 2003 - Elsevier
A (k, n)-threshold visual cryptography scheme is proposed to encode a secret image into n
shadow images, where any k or more of them can visually recover the secret image, but any …
shadow images, where any k or more of them can visually recover the secret image, but any …
On the contrast in visual cryptography schemes
A visual cryptography scheme is a method to encode a secret image SI into shadow images
called shares such that certain qualified subsets of shares enable the``visual''recovery of the …
called shares such that certain qualified subsets of shares enable the``visual''recovery of the …
Sharing multiple secrets in visual cryptography
The secret sharing schemes in conventional visual cryptography are characterized by
encoding one shared secret into a set of random transparencies which reveal the secret to …
encoding one shared secret into a set of random transparencies which reveal the secret to …
Visual cryptography for grey level images
Visual cryptography is a cryptographic paradigm introduced by Naor and Shamir [Lecture
Notes in Comput. Sci., Vol. 950, Springer, Berlin, 1995, p. 1]. Some predefined set of …
Notes in Comput. Sci., Vol. 950, Springer, Berlin, 1995, p. 1]. Some predefined set of …