A novel secret image sharing with steganography scheme utilizing Optimal Asymmetric Encryption Padding and Information Dispersal Algorithms

AM Ahmadian, M Amirmazlaghani - Signal Processing: Image …, 2019 - Elsevier
Secret image sharing schemes are employed to safeguard the confidentiality and availability
of critical commercial or military images. However, many of the existing image sharing …

Three (t, n)-secret image sharing schemes based on homogeneous linear recursion

S Charoghchi, S Mashhadi - Information Sciences, 2021 - Elsevier
In this paper, three novel secret image sharing schemes based on homogeneous linear
recursion are introduced. Simple sharing, various methods for the recovery, small shadow …

Securing face recognition system using blockchain technology

S Shankar, J Madarkar, P Sharma - International Conference on Machine …, 2020 - Springer
Facial recognition is a wide area of a computer vision which is mostly used for security
purpose. The main motive of the face recognition system is to authentic a person from a …

A secure and efficient distributed storage scheme SAONT-RS based on an improved AONT and erasure coding

L Yao, J Lu, J Liu, D Wang, B Meng - IEEE Access, 2018 - ieeexplore.ieee.org
Distributed storage has been widely used by enterprises in big data and cloud computing.
However, the open nature of distributed storage and the geographical restrictions have …

[HTML][HTML] Chinese remainder theorem-based secret image sharing with small-sized shadow images

J Chen, K Liu, X Yan, L Liu, X Zhou, L Tan - Symmetry, 2018 - mdpi.com
Secret image sharing (SIS) with small-sized shadow images has many benefits, such as
saving storage space, improving transmission time, and achieving information hiding. When …