نتایج جستجو برای: sealed secret

تعداد نتایج: 22719  

In this paper, a steganography technique for JPEG2000 compressed images using singular value decomposition in wavelet transform domain is proposed. In this technique, DWT is applied on the cover image to get wavelet coefficients and SVD is applied on these wavelet coefficients to get the singular values. Then secret data is embedded into these singular values using scaling factor. Different com...

2014
Eerke Boiten Jeremy Jacob

Physical means of securing information, such as sealed envelopes and scratch cards, can be used to achieve cryptographic objectives, including ones that are hard or impossible by electronic means. So far, descriptions of such mechanisms have been informal, and as a consequence so has the associated reasoning. This paper3 takes a formal methods approach to these physical cryptography primitives....

Journal: :Astronomy & Geophysics 2005

Journal: :Index on Censorship 2014

Journal: :Index on Censorship 1989

Journal: :Clinics 2006
Telmo Pedro Bonamigo Monica Becker Elton Luiz Schmidt Weber Cláudia Bianco Fausto Miranda Luiz Francisco Poli de Figueiredo

OBJECTIVE To establish, in a case-control study, the early mortality and long-term survival after surgical correction of sealed rupture abdominal aortic aneurysm, compared to controls who underwent standard, nonruptured abdominal aortic aneurysm repair. PATIENTS AND METHODS From January 1992 to December 2002, 465 patients underwent infrarenal abdominal aortic aneurysm repair. Of those, 13 had...

Journal: :Nature 1993

Journal: :Offset 1969

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

Abbas Cheraghi,

In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید