S Charoghchi, S Mashhadi - Information Sciences, 2021 - Elsevier
In this paper, three novel secret image sharing schemes based on homogeneous linear recursion are introduced. Simple sharing, various methods for the recovery, small shadow …
S Shankar, J Madarkar, P Sharma - International Conference on Machine …, 2020 - Springer
Facial recognition is a wide area of a computer vision which is mostly used for security purpose. The main motive of the face recognition system is to authentic a person from a …
L Yao, J Lu, J Liu, D Wang, B Meng - IEEE Access, 2018 - ieeexplore.ieee.org
Distributed storage has been widely used by enterprises in big data and cloud computing. However, the open nature of distributed storage and the geographical restrictions have …
J Chen, K Liu, X Yan, L Liu, X Zhou, L Tan - Symmetry, 2018 - mdpi.com
Secret image sharing (SIS) with small-sized shadow images has many benefits, such as saving storage space, improving transmission time, and achieving information hiding. When …