… authentication method and the proposed secretsharing method… hiding and authentication method to authenticatehidden data. … to develop secretsharing techniques with steganographic …
… covert communication, secretsharing, and text authentication, on … secretsharing method via mobile devices has been proposed. The shares are produced with a steganographicscheme…
… scheme for digital images and documents based on visual secretsharing and steganography… Visual cryptography scheme is a secretsharing technique, which splits a binary image into …
… And authentication is a technique for assuring the fidelity and integrity of protected digital … study, secretsharing methods for text-type documents with steganography and authentication …
… a scheme for display control on specified computers is proposed. For the application of secret sharing, we share … In this study, a technique of secretsharing with steganographic effects is …
… protection, covert communication, authentication, and secretsharing. The processed file … Special space codes are used again as authentication signals with steganographic effects. …
… of the XPS are proposed for covert communication, text authentication, and steganography. … , such as metadata association, secretsharing, and so on. 3. The idea of the proposed …
… This dissertation proposes three techniques for data hiding, image sharing, and image authentication with cross recovery based on Joint Photographic Experts Group (JPEG). Data …
… 摘要(英) Visual cryptography is a very secure and unique way to protect secrets. Unlike traditional cryptographic schemes, it uses human eyes to recover the secret without any complex …