Showing 1 - 5 of 5
As a significant part of information security, Visual Cryptography (VC) is a secret sharing approach which has the advantage of effectively obscuring hints of original secret. In VC, a secret image is separated into partitions which are also known as VC shares. The secret is only able to be...
Persistent link: https://www.econbiz.de/10012043929
In this paper, we first follow Ateniese et al.'s work that provides upper bounds of the pixel expansion of visual cryptography schemes(VCSs) for more kinds of graph access structures, in which we require that a subset of parties can determine the secret if they contain an edge of the graph G....
Persistent link: https://www.econbiz.de/10012043942
Despite research work achieving progress in preserving the privacy of user profiles and visual surveillance, correcting problems in social media have not taken a great step. The reason is the lack of effective modelling, computational algorithms, and resultant evaluations in quantitative...
Persistent link: https://www.econbiz.de/10012043967
This article proposes a visual gambling scheme, in which the banker encodes several images into random-looking share images that are printed on transparencies and declares the contents of the original images at the same time. Afterwards the gambler chooses a random-looking share image and...
Persistent link: https://www.econbiz.de/10012043975
This article proposes a system that focuses on Android application runtime behavior forensics. Using Linux processes, a dynamic injection and a Java function hook technology, the system is able to manipulate the runtime behavior of applications without modifying the Android framework and the...
Persistent link: https://www.econbiz.de/10012043979