Sciweavers

977 search results - page 30 / 196
» Secret image sharing
Sort
View
IAJIT
2010
112views more  IAJIT 2010»
14 years 10 months ago
Variable Rate Steganography in Gray Scale Digital Images Using Neighborhood Pixel Information
: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Security has always been a major concern since time im...
Moazzam Hossain, Sadia Al Haque, Farhana Sharmin
CSREASAM
2007
15 years 1 months ago
Allocation of Partitioned Data by Using A Neural Network Based Approach
In this paper, we investigate allocation of data partitions in the network for data objects that are partitioned by using secret sharing schemes [12] or erasure coding schemes [11...
Manghui Tu, Dongfeng Wang, Peng Li, Nasser Tadayon
IJNSEC
2008
85views more  IJNSEC 2008»
14 years 11 months ago
A Self-healing Key Distribution Scheme with Novel Properties
We improve a secret sharing scheme, which enables users select their personal keys by themselves instead of being distributed by group manager and users can reuse their personal k...
Biming Tian, Mingxing He
ICCV
2009
IEEE
16 years 4 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
FFA
2010
139views more  FFA 2010»
14 years 10 months ago
Coset bounds for algebraic geometric codes
We develop new coset bounds for algebraic geometric codes. The bounds have a natural interpretation as an adversary threshold for algebraic geometric secret sharing schemes and le...
Iwan M. Duursma, Seungkook Park