Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Improved visual secret sharing scheme for QR code applications
Y Cheng, Z Fu, B Yu - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Quick response (QR) codes have been widely used in applications, such as data storage
and high-speed machine reading. Anyone can gain access to the information stored in QR …
and high-speed machine reading. Anyone can gain access to the information stored in QR …
Enhanced Boolean-based multi secret image sharing scheme
CN Yang, CH Chen, SR Cai - Journal of Systems and software, 2016 - Elsevier
Abstract Recently, Chen and Wu propose a (n, n) multi secret image sharing (MSIS) scheme
that shares n secret images into n shared images. These n shared images can be together …
that shares n secret images into n shared images. These n shared images can be together …
Probabilistic color visual cryptography schemes for black and white secret images
Color-black-and-white visual cryptography scheme (CBW-VCS) is a methodology that
utilizes colors to alleviate the pixel expansion problem. In a general (k, n) CBW-VCS, when k …
utilizes colors to alleviate the pixel expansion problem. In a general (k, n) CBW-VCS, when k …
Parabit: processing parallel bitwise operations in nand flash memory based ssds
Processing-in-memory (PIM) and in-storage-computing (ISC) architectures have been
constructed to implement computation inside memory and near storage, respectively. While …
constructed to implement computation inside memory and near storage, respectively. While …
Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality
X Yan, S Wang, X Niu, CN Yang - Digital Signal Processing, 2015 - Elsevier
In halftone visual cryptography scheme (HVCS), a secret image can be embedded into
halftone shares with meaningful information of the cover images. Meaningful shares are …
halftone shares with meaningful information of the cover images. Meaningful shares are …
Extended capabilities for XOR-based visual cryptography
X Wu, W Sun - IEEE Transactions on Information Forensics and …, 2014 - ieeexplore.ieee.org
The XOR-based visual cryptography (VC) is a possible methodology to solve the poor visual
quality problem without darkening the background in VC. However, investigations on XOR …
quality problem without darkening the background in VC. However, investigations on XOR …
Collaborative visual cryptography schemes
X Jia, D Wang, D Nie, C Zhang - IEEE Transactions on Circuits …, 2016 - ieeexplore.ieee.org
A (k, n)-conventional visual cryptography (VC) scheme is designed to share one secret and
each participant takes one share. When some common participants are involved in multiple …
each participant takes one share. When some common participants are involved in multiple …
Combination of Sharing Matrix and Image Encryption for Lossless -Secret Image Sharing
This paper first introduces a (k, n)-sharing matrix S (k, n) and its generation algorithm.
Mathematical analysis is provided to show its potential for secret image sharing. Combining …
Mathematical analysis is provided to show its potential for secret image sharing. Combining …
Perfect contrast XOR-based visual cryptography schemes via linear algebra
G Shen, F Liu, Z Fu, B Yu - Designs, Codes and Cryptography, 2017 - Springer
XOR-based visual cryptography scheme (XVCS) was proposed to solve the poor visual
quality problem without darkening the background in the reconstructed secret image …
quality problem without darkening the background in the reconstructed secret image …
Efficient constructions for progressive visual cryptography with meaningful shares
PL Chiu, KH Lee - Signal Processing, 2019 - Elsevier
In a progressive visual cryptography scheme (PVCS), the clarity of recovered images can be
enhanced by increasing the number of stacking shares. Noise-like shares are hard to …
enhanced by increasing the number of stacking shares. Noise-like shares are hard to …