منابع مشابه
Threshold Secret Image Sharing
A (k, n) threshold secret image sharing scheme, abbreviated as (k, n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret image exactly. In 2002, for (k, n)-TSISS, Thien and Lin reduced the size of each shadow image to 1 k of the original secret image. Their main technique is by adopting all coefficients of a (k − 1)-deg...
متن کاملPreserving Your Revenue-management System as a Trade Secret
Make sure that your revenue-management system is safe from trade-secret piracy.
متن کاملKnowledge management techniques: teaching and dissemination concepts
This paper describes knowledge management teaching and dissemination concepts to support the training of professionals in an organisation to manage their knowledge assets. They are based on AIAIs experience of working with large organisations to establish a technical knowledge management framework and to support their personnel in implementing the framework. The concepts support organisations w...
متن کاملMulti-Threshold Visual Secret Sharing
Visual cryptography (VC) has been developed extensively based on its practicability. These schemes can encode a black-and-white secret image into several shadow images, and, by stacking a certain number of shadow images, can retrieve the secret image through the human visual system. In this paper, we employ Hsu et al.’s ideal multi-threshold secret sharing scheme based on monotone span programs...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Secrecy and Society
سال: 2021
ISSN: 2377-6188
DOI: 10.31979/2377-6188.2021.020205