|
|
|
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl...
ver más
|
|
|
|
|
|
|
Yu-Hong Chen and Justie Su-Tzu Juan
XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle of XOR-based VCS is to encrypt a secret image into several encrypted images, called shares. No information about the secret can be obtained from any o...
ver más
|
|
|
|
|
|
|
Tianyu Bai, Song Fu and Qing Yang
With the wider adoption of edge computing services, intelligent edge devices, and high-speed V2X communication, compute-intensive tasks for autonomous vehicles, such as object detection using camera, LiDAR, and/or radar data, can be partially offloaded t...
ver más
|
|
|
|
|
|
|
Tao Liu, Bin Yan and Jeng-Shyang Pan
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc. Recently, researches have indicated that combini...
ver más
|
|
|
|
|
|
|
Jitendra Saturwar,D.N. Chaudhari
Pág. 93 - 100
With the growth in digital world, it is becoming more important to find a method toprotect the security of digital media. An image watermarking model based on visual secretsharing (VSS) is proposed for protection of ownership. In the embedding phase, the...
ver más
|
|
|
|
|
|
|
William J. Buchanan, David Lanc, Elochukwu Ukwandu, Lu Fan, Gordon Russell and Owen Lo
The Public Key Infrastructure (PKI) is crumbling, partially due to the lack of a strong understanding of how encryption actually works, but also due to weaknesses in its implementation. This paper outlines an Internet storage technique using secret shari...
ver más
|
|
|
|