11   Artículos

 
en línea
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng    
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yu-Hong Chen and Justie Su-Tzu Juan    
XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle of XOR-based VCS is to encrypt a secret image into several encrypted images, called shares. No information about the secret can be obtained from any o... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Tianyu Bai, Song Fu and Qing Yang    
With the wider adoption of edge computing services, intelligent edge devices, and high-speed V2X communication, compute-intensive tasks for autonomous vehicles, such as object detection using camera, LiDAR, and/or radar data, can be partially offloaded t... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Tao Liu, Bin Yan and Jeng-Shyang Pan    
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc. Recently, researches have indicated that combini... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jitendra Saturwar,D.N. Chaudhari     Pág. 93 - 100
With the growth in digital world, it is becoming more important to find a method toprotect the security of digital media. An image watermarking model based on visual secretsharing (VSS) is proposed for protection of ownership. In the embedding phase, the... ver más
Revista: IRA-International Journal of Technology & Engineering    Formato: Electrónico

 
en línea
William J. Buchanan, David Lanc, Elochukwu Ukwandu, Lu Fan, Gordon Russell and Owen Lo    
The Public Key Infrastructure (PKI) is crumbling, partially due to the lack of a strong understanding of how encryption actually works, but also due to weaknesses in its implementation. This paper outlines an Internet storage technique using secret shari... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »