Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication
Abstract As an effective way to securely transfer secret images, secret image sharing (SIS) has been a noteworthy area of research. Basically in a SIS scheme, a secret image is shared via shadows and could be reconstructed by having the required number of them. A major downside of this method is its...
Saved in:
Main Authors: | Sara Charoghchi, Zahra Saeidi, Samaneh Mashhadi |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2024-12-01
|
Series: | CAAI Transactions on Intelligence Technology |
Subjects: | |
Online Access: | https://doi.org/10.1049/cit2.12357 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Fair secret sharing scheme using asymmetric bivariate polynomial
by: Wenwei YANG, et al.
Published: (2019-02-01) -
Social Media Will Tell Your Story: The Digital Strategy of #Ham4Ham
by: Ismael Lopez Medel
Published: (2023-02-01) -
Efficacy of the Fumigant Ethanedinitrile to Control the Ham Mite, <i>Tyrophagus putrescentiae</i> (Schrank) (Sarcoptiformes: Acaridae), and Its Sorption on Dry-Cured Ham
by: Jacqueline M. Maille, et al.
Published: (2024-12-01) -
Complete Homogeneous Symmetric Polynomials with Repeating Variables
by: Luis Angel González-Serrano, et al.
Published: (2024-12-01) -
On Hilbert polynomial of certain determinantal ideals
by: Shrinivas G. Udpikar
Published: (1991-01-01)