_ | secret | _ |
AMBTC-based | secret | image sharing by simple modular arithmetic |
Anti-phishing technique based on dynamic image captcha using multi | secret | sharing scheme |
Aspect ratio invariant visual | secret | sharing schemes with minimum pixel expansion |
Audio | secret | Management Scheme Using Shamir's Secret Sharing |
Audio | secret | Management Scheme Using Shamir's Secret Sharing |
Authors reply Sharing | secret | s in stego images with authentication |
Avoiding weak parameters in | secret | image sharing |
Behind the Scene: Revealing the | secret | s of Pre-trained Vision-and-language Models |
Biometric Feature-Type Transformation: Making templates compatible for | secret | protection |
Bit-level based | secret | sharing for image encryption |
Blind multipurpose watermarking with insertion of a single watermark: A generic construction based on verifiable threshold | secret | sharing |
Cheat-Prevention Visual | secret | Sharing Scheme with Minimum Pixel Expansion, A |
Cheating Detection in (k, n) | secret | Image Sharing Scheme |
Cheating in (halftone- | secret | ) visual cryptography: Analysis of blind authentication schemes |
cheating prevention scheme for binary visual cryptography with homogeneous | secret | images, A |
combination of color-black-and-white visual cryptography and polynomial based | secret | image sharing, A |
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)- | secret | Image Sharing |
comment on Sharing | secret | s in stego images with authentication, A |
Comments on Matrix-Based | secret | Sharing Scheme for Images |
Common Method of Share Authentication in Image | secret | Sharing, A |
construction method of (t,k,n)-essential | secret | image sharing scheme, A |
Correction of | secret | Images Reconstructed from Noised Shared Images |
Data hiding in halftone images with | secret | -shared dot diffusion |
Descending, Lifting or Smoothing: | secret | s of Robust Cost Optimization |
Designing Template Cells Suitable for | secret | -Sharing Halftone Images by Quantitative Analysis |
Destination Assisted | secret | Wireless Communication With Cooperative Helpers |
Discovering And Sharing of | secret | Architectures: The Hidden Tomb of The Pharaoh of El-Khasneh, Jordan |
Distortion-free | secret | image sharing mechanism using modulus operator |
Distortion-free | secret | image sharing method with two meaningful shadows |
Doc-Trace: Tracing | secret | Documents in Cloud Computing via Steganographic Marking |
Document image | secret | sharing using bit-level processing |
efficient lossless | secret | sharing scheme for medical images, An |
Efficient visual | secret | sharing scheme for color images |
Enhanced Matrix-Based | secret | Image Sharing Scheme |
enhanced threshold visual | secret | sharing based on random grids, An |
Essential | secret | image sharing scheme with different importance of shadows |
Essential | secret | image sharing scheme with equal-sized shadows generation |
Essential | secret | image sharing scheme with small and equal sized shadows |
Estimating the | secret | Key of Spread Spectrum Watermarking Based on Equivalent Keys |
Extended Visual | secret | Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels |
Finding the | secret | of Image Saliency in the Frequency Domain |
Format-Compliant Selective | secret | 3-D Object Sharing Scheme |
Friendly progressive random-grid-based visual | secret | sharing with adaptive contrast |
Friendly progressive visual | secret | sharing |
general progressive | secret | image sharing construction method, A |
Generalized 2-d Cyclic Patterns for | secret | Watermark Generation |
Generalized general access structure in | secret | image sharing |
Generating random grid-based visual | secret | sharing with multi-level encoding |
H.264 video watermarking with | secret | image sharing |
Hiding a | secret | Pattern into Color Halftone Images |
Hiding | secret | data adaptively in vector quantisation index tables |
Hiding | secret | data in images via predictive coding |
Hierarchical | secret | image sharing scheme in compressed sensing |
hierarchical threshold | secret | image sharing, A |
High performance image steganography integrating IWT and Hamming code within | secret | sharing |
High security Iris verification system based on random | secret | integration |
Homomorphic Method for Sharing | secret | Images, A |
Image and Model Transformation with | secret | Key for Vision Transformer |
image intellectual property protection scheme for gray-level images using visual | secret | sharing strategy, An |
Image | secret | sharing method with two-decoding-options: Lossless recovery and previewing capability |
Improvement of the Quality of Visual | secret | Sharing Schemes with Constraints on the Usage of Shares |
Improvements of a two-in-one image | secret | sharing scheme based on gray mixing model |
Improving recovered image quality in | secret | image sharing by simple modular arithmetic |
Improving the visual quality of random grid-based visual | secret | sharing via error diffusion |
Increasing | secret | Data Hiding Capacity in QR Code Using 3X3 Subcells |
Integration of Device Fingerprint Authentication and Physical-Layer | secret | Key Generation |
Invertible | secret | image sharing with steganography |
Invertible | secret | image sharing with steganography and authentication for AMBTC compressed images |
Joint | secret | Image Sharing and Jpeg Compression Scheme, A |
K out of N | secret | Sharing Scheme for Multiple Color Images with Steganography and Authentication |
Lossless recovery of a VQ index table with embedded | secret | data |
LSB steganography with usage of Mojette Transform for | secret | image scrambling |
LWE-based verifiable essential | secret | image sharing scheme ((t,s,k,n)-VESIS) |
Marine Robots Mapping the Present and the Past: Unraveling the | secret | s of the Deep |
Matrix-Based | secret | Sharing Scheme for Images, A |
Multi-factor cheating prevention in visual | secret | sharing by hybrid codebooks |
multi-threshold | secret | image sharing scheme based on MSP, A |
New approaches for efficient information hiding-based | secret | image sharing schemes |
New Aspect Ratio Invariant Visual | secret | Sharing Schemes Using Square Block-Wise Operation |
New Image Steganography via | secret | -Fragment-Visible Mosaic Images by Nearly-Reversible Color Transformation |
new multi- | secret | image sharing scheme based on DCT, A |
new scheme of sharing | secret | s in stego images with authentication, A |
New | secret | Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata, A |
New Secure Image Transmission Technique via | secret | -Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations, A |
New visual | secret | sharing schemes using probabilistic method |
Non-iterative reversible information hiding in the | secret | sharing domain |
novel (k1,k2,n)-threshold two-in-one | secret | image sharing scheme for multiple secrets, A |
novel (k1,k2,n)-threshold two-in-one | secret | image sharing scheme for multiple secrets, A |
novel real-time and progressive | secret | image sharing with flexible shadows based on compressive sensing, A |
novel | secret | image sharing with steganography scheme utilizing Optimal Asymmetric Encryption Padding and Information Dispersal Algorithms, A |
Novel Two-in-One Image | secret | Sharing Scheme Based on Perfect Black Visual Cryptography, A |
novel video encryption technique based on | secret | sharing, A |
Omni-GAN: On the | secret | s of cGANs and Beyond |
On estimation of | secret | message length in jsteg-like steganography |
On the Security of an MPEG-Video Encryption Scheme Based on | secret | Huffman Tables |
On the Security of | secret | Sharing Over a Ring and the Fast Implementation |
Optimal (2,n) and (2,infinity) visual | secret | sharing by generalized random grids |
Partial | secret | image sharing for (k,n) threshold based on image inpainting |
Participants increasing for threshold random grids-based visual | secret | sharing |
Privacy protected image denoising with | secret | shares |
Privacy Protection for Social Media Based on A Hierarchical | secret | Image Sharing Scheme |
privilege-based visual | secret | sharing model, A |
Probabilistic color visual cryptography schemes for black and white | secret | images |
Progressive (k,n) | secret | image sharing Scheme with meaningful shadow images by GEMD and RGEMD |
Progressive (k,n) | secret | image sharing schemes based on Boolean operations and covering codes |
progressive | secret | reveal system based on SPIHT image transmission, A |
Progressive Visual | secret | Sharing with Multiple Decryptions and Unexpanded Shares |
Protecting Visual | secret | s Using Adversarial Nets |
Public Watermark Detection Using Multiple Proxies and | secret | Sharing |
Quadri-directional searching algorithm for | secret | image sharing using meaningful shadows |
Quality-improved threshold visual | secret | sharing scheme by random grids |
r, n)-Threshold Image | secret | Sharing Methods with Small Shadow Images |
Random grid based color visual cryptography scheme for black and white | secret | images with general access structures |
Random grid-based visual | secret | sharing with abilities of OR and XOR decryptions |
Random grid-based visual | secret | sharing with multiple decryptions |
Random Grids-Based Threshold Visual | secret | Sharing with Improved Contrast by Boolean Operations |
Random Grids-Based Threshold Visual | secret | Sharing with Improved Visual Quality |
Randomised visual | secret | sharing scheme for grey-scale and colour images |
Real-time adaptive visual | secret | sharing with reversibility and high capacity |
real-time | secret | image sharing with fairness, A |
Reduce shadow size in aspect ratio invariant visual | secret | sharing schemes using a square block-wise operation |
Reducing shadow size in essential | secret | image sharing by conjunctive hierarchical approach |
Revealing the Dark | secret | s of Masked Image Modeling |
Revealing the | secret | of FaceHashing |
Revealing the | secret | s of Stonehenge Through the Application of Laser Scanning, Photogrammetry and Visualisation Techniques |
Reversibility-oriented | secret | image sharing mechanism with steganography and authentication based on code division multiplexing |
Reversible AMBTC-based | secret | sharing scheme with abilities of two decryptions |
Reversible Data Hiding for Encrypted 3D Mesh Models With | secret | Sharing Over Galois Field |
Reversible Data Hiding in Encrypted Image via | secret | Sharing Based on GF(p) and GF(28) |
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback | secret | Sharing |
Reversible Data Hiding in Encrypted Images With | secret | Sharing and Hybrid Coding |
Reversible Data Hiding Over Encrypted Images via Preprocessing-Free Matrix | secret | Sharing |
Reversible Data Hiding Scheme in Encrypted Domain for | secret | Image Sharing Based on Chinese Remainder Theorem, A |
reversible extended | secret | image sharing scheme based on Chinese remainder theorem, A |
Robust Approaches to 3D Object | secret | Sharing |
Robust Extraction of | secret | Bits from Minutiae |
Scalable | secret | image sharing |
Scalable | secret | image sharing scheme with essential shadows |
Scalable | secret | Image Sharing With Smaller Shadow Images |
Scribble-a- | secret | : Similarity-based password authentication using sketches |
second generation Visual | secret | Sharing scheme for color images, A |
| secret | and public key image watermarking schemes for image authentication and ownership verification |
| secret | communication in colored images using saliency map as model |
| secret | Image Restoration With Convex Hull and Elite Opposition-Based Learning Strategy |
| secret | image sharing based on cellular automata and steganography |
| secret | Image Sharing for (k, k) Threshold Based on Chinese Remainder Theorem and Image Characteristics |
| secret | image sharing in the encrypted domain |
| secret | Image Sharing Method using Integer Multiwavelet Transform, A |
| secret | Image Sharing Method Using Integer-to-Integer Wavelet Transform, A |
| secret | image sharing scheme with adaptive authentication strength |
| secret | image sharing scheme with hierarchical threshold access structure |
| secret | image sharing with separate shadow authentication ability |
| secret | image sharing with smaller shadow images |
| secret | image transmission based on VQ and data embedding |
| secret | Image Transmission Scheme Using Secret Codebook |
| secret | Image Transmission Scheme Using Secret Codebook |
| secret | JPEG Image Sharing Method Over GF(2M) Galois Fields, A |
| secret | Key Generation by Continuous Encryption Before Quantization |
| secret | Key Watermarking with Changing Keys |
| secret | Key-Based Image Steganography in Spatial Domain |
| secret | of velvety skin, The |
| secret | Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks, The |
| secret | Sharing Based Video Watermark Algorithm for Multiuser |
| secret | Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion |
| secret | Sharing Scheme for Digital Images Based on Two-Dimensional Linear Cellular Automata, A |
| secret | -Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability, A |
| secret | s of adaptive support weight techniques for local stereo matching |
| secret | s of Event-Based Optical Flow |
| secret | s of GrabCut and Kernel K-Means |
| secret | s of Image Denoising cuisine |
| secret | s of Matrix Factorization: Approximations, Numerics, Manifold Optimization and Random Restarts |
| secret | s of optical flow estimation and their principles |
| secret | s of S. Maria Delle Grazie: Virtual Fruition of An Iconic Milanese Architecture, The |
| secret | s of Salient Object Segmentation, The |
secure fingerprint template generation mechanism using visual | secret | sharing with inverse halftoning, A |
secure high capacity full-gray-scale-level multi-image information hiding and | secret | image authentication scheme via Tchebichef moments, A |
Seeing | secret | s in the Ice: A Drone-Based Radar Looks for the Future of Climate Change |
Sharing a verifiable | secret | image using two shadows |
Sharing and hiding | secret | images with size constraint |
Sharing multiple | secret | s in visual cryptography |
Sharing Multiple | secret | s in XOR-Based Visual Cryptography by Non-Monotonic Threshold Property |
Sharing | secret | s in stego images with authentication |
Sharing Visual | secret | s Among Multiple Groups With Enhanced Performance |
Sharing Visual | secret | s in Single Image Random Dot Stereograms |
Size-invariant two-in-one image | secret | sharing scheme based on gray mixing model |
survey paper on | secret | image sharing schemes, A |
t,n)-multi | secret | image sharing scheme based on Boolean operations, A |
Threshold visual | secret | sharing with comprehensive properties based on random grids |
Toward Construction-Based Data Hiding: From | secret | s to Fingerprint Images |
Transfer Learning-Based Model Protection with | secret | Key |
Two in One Image | secret | Sharing Scheme (TiOISSS) for extended progressive visual cryptography using simple modular arithmetic operations |
Two | secret | sharing schemes based on Boolean operations |
Two-in-One Image | secret | Sharing Scheme Based on Boolean Operations |
Two-layered structure for optimally essential | secret | image sharing scheme |
User-Friendly Random-Grid-Based Visual | secret | Sharing |
User-friendly | secret | image sharing scheme with verification ability based on block truncation coding and error diffusion |
Verifiable varying sized (m,n,n) multi-image | secret | sharing with combiner verification and cheater identification |
Visual Cryptography and | secret | Image Sharing |
Visual cryptography scheme for | secret | color images with color QR codes |
Visual Multiple- | secret | Sharing By Circle Random Grids |
Visual | secret | sharing by random grids revisited |
Visual | secret | sharing for multiple secrets |
Visual | secret | sharing for multiple secrets |
Visual | secret | sharing scheme for (k, n) threshold based on QR code with multiple decryptions |
Visual | secret | sharing scheme with (n,n) threshold based on WeChat Mini Program codes |
Visual | secret | Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions |
Visual Two- | secret | Sharing Schemes by Different Superimposition Positions |
Volumetric Bias in Segmentation and Reconstruction: | secret | s and Solutions |
Weighted Threshold | secret | Image Sharing |
Weighted visual | secret | sharing for general access structures based on random grids |
210 for secret