The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
QR barcodes are used extensively due to their beneficial properties, including small tag, large data capacity, reliability, and high-speed scanning. However, the private data of the QR barcode lacks adequate security protection. In this article, we design a secret QR sharing approach to protect the private QR data with a secure and reliable distributed system. The proposed approach differs from related...
This paper presents an active tamper detection and content recovery scheme for digital gray images. It mainly adopts vector quantization compression and treats the index codes as the authentication and recovery data of an image. In order to achieve the purpose of detecting and locating whether an image has been tampered with, this scheme embeds the essential information of authentication and recovery...
In cloud computing environments, the user authentication scheme is an important security tool because it provides the authentication, authorization, and accounting for cloud users. Therefore, many user authentication schemes for cloud computing have been proposed in recent years. However, we find that most of the previous authentication schemes have some security problems. Besides, it cannot be implemented...
Fragile watermarking is applied to protect the integrity of the digital media. Current fragile watermarking schemes mainly provide the functionality of detecting and locating the tampered regions of an authorized image. The capability to recover the tampered regions has rarely been discussed in the literature. In fact, the recovery ability is an important issue while proving and maintaining the image...
The significant essential of secret image sharing approaches is that the revealed content of the secret image must be lossless. Moreover, the distorted stego images can be reverted to the original cover image. In order to achieve these purposes, we first transform the secret pixels into the m-ary notational system. Then, the information data used to reconstruct original pixels from camouflaged pixels...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.