We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 7,878 results
  1. Novel key-integration to safeguard counting-based secret-sharing from possibilities of cyberattack breaches

    In the face of malicious cyberattacks, classic security approaches like cryptography and steganography are becoming not sufficient. Secrecy are...

    Adnan Gutub, Faiza Al-Shaarani, Khoulood Alharthi in Multimedia Tools and Applications
    Article 19 April 2024
  2. Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing

    Image secret sharing (ISS) is gaining popularity due to the importance of digital images and its wide application to cloud-based distributed storage...

    Xuehu Yan, Longlong Li, ... Lei Sun in Frontiers of Information Technology & Electronic Engineering
    Article 23 January 2023
  3. Multi-party codebook distribution strategy based on secret sharing

    The paper addresses the issue of secure distribution of codebooks in the field of information security, particularly in the domain of covert...

    Wei She, Haige Feng, ... Wei Liu in International Journal of Information Security
    Article 02 July 2024
  4. Strengthening wavelet based image steganography using Rubik’s cube segmentation and secret image scrambling

    Image steganography is an extremely rich and significant exploration region that gives productive answers to some genuine and modern issues. This...

    Jyoti Khandelwal, Vijay Kumar Sharma in Multimedia Tools and Applications
    Article 29 February 2024
  5. Software and hardware realizations for different designs of chaos-based secret image sharing systems

    Secret image sharing (SIS) conveys a secret image to mutually suspicious receivers by sending meaningless shares to the participants, and all shares...

    Bishoy K. Sharobim, Muhammad Hosam, ... Ahmed G. Radwan in Journal of Real-Time Image Processing
    Article Open access 06 May 2024
  6. Authentic secret share creation techniques using visual cryptography with public key encryption

    In the digital transparent world, share the secret messages are challenged one. Visual cryptography (VC) is safer method for information transfer...

    M. Karolin, T. Meyyappan in Multimedia Tools and Applications
    Article 22 July 2021
  7. A reversible data hiding in encrypted image based on additive secret sharing with adaptive bit-plane prediction

    With the rapid development of 5G network, protecting multimedia data security has attracted a lot of attentions, and Reversible Data Hiding in...

    Hui Shi, Ziyi Zhou, ... Mingchu Li in Multimedia Tools and Applications
    Article 12 October 2023
  8. Security to text (S2T): multi-layered based security approaches for secret text content

    In the digital world, text data is produced in an unstructured manner across various communication channels. Extracting valuable information from...

    Shamal Kashid, Lalit K. Awasthi, Krishan Berwal in Multimedia Tools and Applications
    Article 19 June 2024
  9. A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions

    Secret sharing schemes play a vital role in securely distributing a secret among multiple participants, ensuring confidentiality and access control....

    Bhawana Parihar, Arjun Singh Rawat, Maroti Deshmukh in The Journal of Supercomputing
    Article 30 April 2024
  10. Physical-layer secret key generation based on domain-adversarial training of autoencoder for spatial correlated channels

    As a novel approach to enhance information security, physical-layer key generation is based on the channel reciprocity and spatial decorrelation of...

    **gqi Zhou, **n Zeng in Applied Intelligence
    Article 22 June 2022
  11. Enhanced block based progressive visual secret sharing scheme for grayscale and color image

    Block by block, the secret image will be retrieved from user-friendly and noise-like shares in the Block Based Progressive Secret Sharing (BPVSS)...

    Vishal V. Panchbhai, Suchita W. Varade in Multimedia Tools and Applications
    Article 07 November 2023
  12. Secret-free security: a survey and tutorial

    “Classical keys,” i.e., secret keys stored permanently in digital form in nonvolatile memory, appear indispensable in modern computer security—but...

    Article Open access 02 March 2022
  13. Watermarkable Public Key Encryption with Efficient Extraction Under Standard Assumptions

    The current state of the art in watermarked public-key encryption schemes under standard cryptographic assumptions suggests that extracting the...
    Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari in Security and Cryptography for Networks
    Conference paper 2022
  14. Extraction of secrets from LSB stego images using various denoising methods

    Extraction of the secret is the main goal of steganalysis and in order to accomplish it, an apt cover estimator is a viable solution. Also, the...

    S. Arivazhagan, W. Sylvia Lilly Jebarani, ... E. Amrutha in International Journal of Information Technology
    Article 01 April 2023
  15. Deep Multi-image Hiding with Random Key

    Multi-image hiding is the technique of hiding multiple secret images within one cover image. In most existing methods, it is possible for one...
    Wei Zhang, Weixuan Tang, ... Jiwu Huang in Artificial Intelligence Security and Privacy
    Conference paper 2024
  16. Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks

    Farfalle is a permutation-based construction for building a pseudorandom function which has been proposed by Bertoni et al. in 2017. In this work, we...

    S. Hodžić, A. Roy, E. Andreeva in Designs, Codes and Cryptography
    Article 12 October 2023
  17. Steganographic key recovery for adaptive steganography under “known-message attacks”

    Since the performance of STC (Syndrome-Trellis Codes) is approaching the theoretical optimum in minimizing embedded distortion, STC-based adaptive...

    Hansong Du, Jiufen Liu, ... **angyang Luo in Multimedia Tools and Applications
    Article 17 February 2022
  18. Reversible data hiding based on histogram and prediction error for sharing secret data

    With the advancement of communication technology, a large number of data are constantly transmitted through the internet for various purposes, which...

    Chaidir Chalaf Islamy, Tohari Ahmad, Royyana Muslim Ijtihadie in Cybersecurity
    Article Open access 02 June 2023
  19. LocKey: Location-Based Key Extraction from the WiFi Environment in the User’s Vicinity

    We investigate extracting persistent information from semi-volatile signals in the user’s vicinity to extend existing authentication factors. We use...
    Philipp Jakubeit, Andreas Peter, Maarten van Steen in Information Security Practice and Experience
    Conference paper 2023
Did you find what you were looking for? Share feedback.