Index for secre

_secrecy_
Achieving Perfect secrecy by pdf-Bandlimited Jamming
Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable secrecy Rate based Optimization
Cancelable Biometrics with Perfect secrecy for Correlation-Based Matching
Cooperative secrecy Beamforming in Wiretap Interference Channels
Interleaved Concatenated Coding for secrecy in the Finite Blocklength Regime
Low-Overhead Distributed Jamming for SIMO secrecy Transmission with Statistical CSI
Maximum secrecy Throughput of Transmit Antenna Selection with Eavesdropper Outage Constraints
Multivariate Correlated Rayleigh Fading With MRC and Applications to Wireless secrecy
On secrecy Capacity of Gaussian Wiretap Channel Aided by A Cooperative Jammer
On secrecy Capacity of Helper-Assisted Wiretap Channel with an Out-of-Band Link
On secrecy of a Multi-Antenna System with Eavesdropper in Close Proximity
On the secrecy of Interference-Limited Networks under Composite Fading Channels
Optimal Parameter Encoding Based on Worst Case Fisher Information Under a secrecy Constraint
Overlay Cognitive ABCom-NOMA-Based ITS: An In-Depth secrecy Analysis
Partial-NOMA Based Physical Layer Security: Forwarding Design and secrecy Analysis
Safe Approximation Approach to secrecy Outage Design for MIMO Wiretap Channels, A
secrecy Analysis of ABCom-Based Intelligent Transportation Systems With Jamming
secrecy Capacity Region Maximization in Gaussian MISO Channels With Integrated Services
secrecy Outage Analysis for SIMO Underlay Cognitive Radio Networks over Generalized-K Fading Channels
secrecy Outage Analysis Over Random Beamforming Transmission With User Scheduling: Collusion vs. Exclusion
secrecy Performance of Maximum Ratio Diversity With Channel Estimation Error
secrecy Sum Rate Optimization for Downlink MIMO Nonorthogonal Multiple Access Systems
secrecy Sum-Rate for Orthogonal Random Beamforming With Opportunistic Scheduling
Transceiver Design to Maximize the Weighted Sum secrecy Rate in Full-Duplex SWIPT Systems
24 for secrecy

_secret_
AMBTC-based secret image sharing by simple modular arithmetic
Anti-phishing technique based on dynamic image captcha using multi secret sharing scheme
Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion
Audio secret Management Scheme Using Shamir's Secret Sharing
Audio secret Management Scheme Using Shamir's Secret Sharing
Authors reply Sharing secrets in stego images with authentication
Avoiding weak parameters in secret image sharing
Behind the Scene: Revealing the secrets of Pre-trained Vision-and-language Models
Biometric Feature-Type Transformation: Making templates compatible for secret protection
Bit-level based secret sharing for image encryption
Blind multipurpose watermarking with insertion of a single watermark: A generic construction based on verifiable threshold secret sharing
Cheat-Prevention Visual secret Sharing Scheme with Minimum Pixel Expansion, A
Cheating Detection in (k, n) secret Image Sharing Scheme
Cheating in (halftone-secret) visual cryptography: Analysis of blind authentication schemes
cheating prevention scheme for binary visual cryptography with homogeneous secret images, A
combination of color-black-and-white visual cryptography and polynomial based secret image sharing, A
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-secret Image Sharing
comment on Sharing secrets in stego images with authentication, A
Comments on Matrix-Based secret Sharing Scheme for Images
Common Method of Share Authentication in Image secret Sharing, A
construction method of (t,k,n)-essential secret image sharing scheme, A
Correction of secret Images Reconstructed from Noised Shared Images
Data hiding in halftone images with secret-shared dot diffusion
Descending, Lifting or Smoothing: secrets of Robust Cost Optimization
Designing Template Cells Suitable for secret-Sharing Halftone Images by Quantitative Analysis
Destination Assisted secret Wireless Communication With Cooperative Helpers
Discovering And Sharing of secret Architectures: The Hidden Tomb of The Pharaoh of El-Khasneh, Jordan
Distortion-free secret image sharing mechanism using modulus operator
Distortion-free secret image sharing method with two meaningful shadows
Doc-Trace: Tracing secret Documents in Cloud Computing via Steganographic Marking
Document image secret sharing using bit-level processing
efficient lossless secret sharing scheme for medical images, An
Efficient visual secret sharing scheme for color images
Enhanced Matrix-Based secret Image Sharing Scheme
enhanced threshold visual secret sharing based on random grids, An
Essential secret image sharing scheme with different importance of shadows
Essential secret image sharing scheme with equal-sized shadows generation
Essential secret image sharing scheme with small and equal sized shadows
Estimating the secret Key of Spread Spectrum Watermarking Based on Equivalent Keys
Extended Visual secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels
Finding the secret of Image Saliency in the Frequency Domain
Format-Compliant Selective secret 3-D Object Sharing Scheme
Friendly progressive random-grid-based visual secret sharing with adaptive contrast
Friendly progressive visual secret sharing
general progressive secret image sharing construction method, A
Generalized 2-d Cyclic Patterns for secret Watermark Generation
Generalized general access structure in secret image sharing
Generating random grid-based visual secret sharing with multi-level encoding
H.264 video watermarking with secret image sharing
Hiding a secret Pattern into Color Halftone Images
Hiding secret data adaptively in vector quantisation index tables
Hiding secret data in images via predictive coding
Hierarchical secret image sharing scheme in compressed sensing
hierarchical threshold secret image sharing, A
High performance image steganography integrating IWT and Hamming code within secret sharing
High security Iris verification system based on random secret integration
Homomorphic Method for Sharing secret Images, A
Image and Model Transformation with secret Key for Vision Transformer
image intellectual property protection scheme for gray-level images using visual secret sharing strategy, An
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability
Improvement of the Quality of Visual secret Sharing Schemes with Constraints on the Usage of Shares
Improvements of a two-in-one image secret sharing scheme based on gray mixing model
Improving recovered image quality in secret image sharing by simple modular arithmetic
Improving the visual quality of random grid-based visual secret sharing via error diffusion
Increasing secret Data Hiding Capacity in QR Code Using 3X3 Subcells
Integration of Device Fingerprint Authentication and Physical-Layer secret Key Generation
Invertible secret image sharing with steganography
Invertible secret image sharing with steganography and authentication for AMBTC compressed images
Joint secret Image Sharing and Jpeg Compression Scheme, A
K out of N secret Sharing Scheme for Multiple Color Images with Steganography and Authentication
Lossless recovery of a VQ index table with embedded secret data
LSB steganography with usage of Mojette Transform for secret image scrambling
LWE-based verifiable essential secret image sharing scheme ((t,s,k,n)-VESIS)
Marine Robots Mapping the Present and the Past: Unraveling the secrets of the Deep
Matrix-Based secret Sharing Scheme for Images, A
Multi-factor cheating prevention in visual secret sharing by hybrid codebooks
multi-threshold secret image sharing scheme based on MSP, A
New approaches for efficient information hiding-based secret image sharing schemes
New Aspect Ratio Invariant Visual secret Sharing Schemes Using Square Block-Wise Operation
New Image Steganography via secret-Fragment-Visible Mosaic Images by Nearly-Reversible Color Transformation
new multi-secret image sharing scheme based on DCT, A
new scheme of sharing secrets in stego images with authentication, A
New secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata, A
New Secure Image Transmission Technique via secret-Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations, A
New visual secret sharing schemes using probabilistic method
Non-iterative reversible information hiding in the secret sharing domain
novel (k1,k2,n)-threshold two-in-one secret image sharing scheme for multiple secrets, A
novel (k1,k2,n)-threshold two-in-one secret image sharing scheme for multiple secrets, A
novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing, A
novel secret image sharing with steganography scheme utilizing Optimal Asymmetric Encryption Padding and Information Dispersal Algorithms, A
Novel Two-in-One Image secret Sharing Scheme Based on Perfect Black Visual Cryptography, A
novel video encryption technique based on secret sharing, A
Omni-GAN: On the secrets of cGANs and Beyond
On estimation of secret message length in jsteg-like steganography
On the Security of an MPEG-Video Encryption Scheme Based on secret Huffman Tables
On the Security of secret Sharing Over a Ring and the Fast Implementation
Optimal (2,n) and (2,infinity) visual secret sharing by generalized random grids
Partial secret image sharing for (k,n) threshold based on image inpainting
Participants increasing for threshold random grids-based visual secret sharing
Privacy protected image denoising with secret shares
Privacy Protection for Social Media Based on A Hierarchical secret Image Sharing Scheme
privilege-based visual secret sharing model, A
Probabilistic color visual cryptography schemes for black and white secret images
Progressive (k,n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD
Progressive (k,n) secret image sharing schemes based on Boolean operations and covering codes
progressive secret reveal system based on SPIHT image transmission, A
Progressive Visual secret Sharing with Multiple Decryptions and Unexpanded Shares
Protecting Visual secrets Using Adversarial Nets
Public Watermark Detection Using Multiple Proxies and secret Sharing
Quadri-directional searching algorithm for secret image sharing using meaningful shadows
Quality-improved threshold visual secret sharing scheme by random grids
r, n)-Threshold Image secret Sharing Methods with Small Shadow Images
Random grid based color visual cryptography scheme for black and white secret images with general access structures
Random grid-based visual secret sharing with abilities of OR and XOR decryptions
Random grid-based visual secret sharing with multiple decryptions
Random Grids-Based Threshold Visual secret Sharing with Improved Contrast by Boolean Operations
Random Grids-Based Threshold Visual secret Sharing with Improved Visual Quality
Randomised visual secret sharing scheme for grey-scale and colour images
Real-time adaptive visual secret sharing with reversibility and high capacity
real-time secret image sharing with fairness, A
Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation
Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach
Revealing the Dark secrets of Masked Image Modeling
Revealing the secret of FaceHashing
Revealing the secrets of Stonehenge Through the Application of Laser Scanning, Photogrammetry and Visualisation Techniques
Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing
Reversible AMBTC-based secret sharing scheme with abilities of two decryptions
Reversible Data Hiding for Encrypted 3D Mesh Models With secret Sharing Over Galois Field
Reversible Data Hiding in Encrypted Image via secret Sharing Based on GF(p) and GF(28)
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback secret Sharing
Reversible Data Hiding in Encrypted Images With secret Sharing and Hybrid Coding
Reversible Data Hiding Over Encrypted Images via Preprocessing-Free Matrix secret Sharing
Reversible Data Hiding Scheme in Encrypted Domain for secret Image Sharing Based on Chinese Remainder Theorem, A
reversible extended secret image sharing scheme based on Chinese remainder theorem, A
Robust Approaches to 3D Object secret Sharing
Robust Extraction of secret Bits from Minutiae
Scalable secret image sharing
Scalable secret image sharing scheme with essential shadows
Scalable secret Image Sharing With Smaller Shadow Images
Scribble-a-secret: Similarity-based password authentication using sketches
second generation Visual secret Sharing scheme for color images, A
secret and public key image watermarking schemes for image authentication and ownership verification
secret communication in colored images using saliency map as model
secret Image Restoration With Convex Hull and Elite Opposition-Based Learning Strategy
secret image sharing based on cellular automata and steganography
secret Image Sharing for (k, k) Threshold Based on Chinese Remainder Theorem and Image Characteristics
secret image sharing in the encrypted domain
secret Image Sharing Method using Integer Multiwavelet Transform, A
secret Image Sharing Method Using Integer-to-Integer Wavelet Transform, A
secret image sharing scheme with adaptive authentication strength
secret image sharing scheme with hierarchical threshold access structure
secret image sharing with separate shadow authentication ability
secret image sharing with smaller shadow images
secret image transmission based on VQ and data embedding
secret Image Transmission Scheme Using Secret Codebook
secret Image Transmission Scheme Using Secret Codebook
secret JPEG Image Sharing Method Over GF(2M) Galois Fields, A
secret Key Generation by Continuous Encryption Before Quantization
secret Key Watermarking with Changing Keys
secret Key-Based Image Steganography in Spatial Domain
secret of velvety skin, The
secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks, The
secret Sharing Based Video Watermark Algorithm for Multiuser
secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion
secret Sharing Scheme for Digital Images Based on Two-Dimensional Linear Cellular Automata, A
secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability, A
secrets of adaptive support weight techniques for local stereo matching
secrets of Event-Based Optical Flow
secrets of GrabCut and Kernel K-Means
secrets of Image Denoising cuisine
secrets of Matrix Factorization: Approximations, Numerics, Manifold Optimization and Random Restarts
secrets of optical flow estimation and their principles
secrets of S. Maria Delle Grazie: Virtual Fruition of An Iconic Milanese Architecture, The
secrets of Salient Object Segmentation, The
secure fingerprint template generation mechanism using visual secret sharing with inverse halftoning, A
secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments, A
Seeing secrets in the Ice: A Drone-Based Radar Looks for the Future of Climate Change
Sharing a verifiable secret image using two shadows
Sharing and hiding secret images with size constraint
Sharing multiple secrets in visual cryptography
Sharing Multiple secrets in XOR-Based Visual Cryptography by Non-Monotonic Threshold Property
Sharing secrets in stego images with authentication
Sharing Visual secrets Among Multiple Groups With Enhanced Performance
Sharing Visual secrets in Single Image Random Dot Stereograms
Size-invariant two-in-one image secret sharing scheme based on gray mixing model
survey paper on secret image sharing schemes, A
t,n)-multi secret image sharing scheme based on Boolean operations, A
Threshold visual secret sharing with comprehensive properties based on random grids
Toward Construction-Based Data Hiding: From secrets to Fingerprint Images
Transfer Learning-Based Model Protection with secret Key
Two in One Image secret Sharing Scheme (TiOISSS) for extended progressive visual cryptography using simple modular arithmetic operations
Two secret sharing schemes based on Boolean operations
Two-in-One Image secret Sharing Scheme Based on Boolean Operations
Two-layered structure for optimally essential secret image sharing scheme
User-Friendly Random-Grid-Based Visual secret Sharing
User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion
Verifiable varying sized (m,n,n) multi-image secret sharing with combiner verification and cheater identification
Visual Cryptography and secret Image Sharing
Visual cryptography scheme for secret color images with color QR codes
Visual Multiple-secret Sharing By Circle Random Grids
Visual secret sharing by random grids revisited
Visual secret sharing for multiple secrets
Visual secret sharing for multiple secrets
Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions
Visual secret sharing scheme with (n,n) threshold based on WeChat Mini Program codes
Visual secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions
Visual Two-secret Sharing Schemes by Different Superimposition Positions
Volumetric Bias in Segmentation and Reconstruction: secrets and Solutions
Weighted Threshold secret Image Sharing
Weighted visual secret sharing for general access structures based on random grids
210 for secret

_secretaries_
Optimal Online Data Sampling or How to Hire the Best secretaries

_secretgen_
secretgen: Privacy Recovery on Pre-trained Models via Distribution Discrimination

_secretive_
Ornithologist's Guide for Including Machine Learning in a Workflow to Identify a secretive Focal Species from Recorded Audio, An

_secretly_
Your Diffusion Model is secretly a Zero-Shot Classifier

_secretory_
Evaluating the mid-secretory endometrium appearance using hysteroscopic digital video summarization

Index for "s"


Last update: 2-May-24 21:06:23
Use price@usc.edu for comments.