Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 183
1.
  • Lossless progressive secret... Lossless progressive secret sharing for grayscale and color images
    Prasetyo, Heri; Hsia, Chih-Hsien Multimedia tools and applications, 09/2019, Letnik: 78, Številka: 17
    Journal Article
    Recenzirano

    A new technique on progressive secret sharing is presented. The proposed method offers two different approaches on converting a secret image into a set of shared images. The first approach exploits ...
Celotno besedilo
Dostopno za: CEKLJ, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
2.
  • Improved multiple secret sh... Improved multiple secret sharing using generalized chaotic image scrambling
    Heri Prasetyo; Chih-Hsien Hsia Multimedia tools and applications, 10/2019, Letnik: 78, Številka: 20
    Journal Article
    Recenzirano

    This paper presents a new technique on ( n ,  n )-Multiple Secret Sharing (MSS) of color images. In this task, n shared images are generated from n secret images, while n recovered secret images can ...
Celotno besedilo
Dostopno za: CEKLJ, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
3.
Celotno besedilo
Dostopno za: UL
4.
  • Passive Copy-Move Forgery D... Passive Copy-Move Forgery Detection Using Halftoning-based Block Truncation Coding Feature
    Harjito, Bambang; Prasetyo, Heri Journal of physics. Conference series, 06/2017, Letnik: 855, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    ABSTRACT This paper presents a new method on passive copy-move forgery detection by exploiting the effectiveness and usability of Halftoning-based Block Truncation Coding (HBTC) image feature. ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
5.
  • Fast Comprehensive Secret S... Fast Comprehensive Secret Sharing using Naive Image Compression
    Prasetyo, Heri; Prayuda, Kukuh Caezaocta International journal of advanced computer science & applications, 01/2022, Letnik: 13, Številka: 12
    Journal Article
    Odprti dostop

    This paper presents a simple method for performing (k,n)-Secret Sharing (SS) with fast computation. It aims to reduce the computational time of the former scheme in the shadow generation process. The ...
Celotno besedilo
Dostopno za: NUK, UL
6.
  • Hyperchaos permutation on f... Hyperchaos permutation on false-positive-free SVD-based image watermarking
    Guo, Jing-Ming; Riyono, Dwi; Prasetyo, Heri Multimedia tools and applications, 10/2019, Letnik: 78, Številka: 20
    Journal Article
    Recenzirano

    This paper reports the effect of hyperchaos permutation on the False-Positive-Free (FPF) Singular Value Decomposition (SVD)-based image watermarking scheme. To further improve the security aspect, ...
Celotno besedilo
Dostopno za: CEKLJ, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
7.
  • A Note on Multiple Secret S... A Note on Multiple Secret Sharing Using Chinese Remainder Theorem and Exclusive-OR
    Prasetyo, Heri; Guo, Jing-Ming IEEE access, 2019, Letnik: 7
    Journal Article
    Recenzirano
    Odprti dostop

    This paper reviews the former existing scheme on <inline-formula> <tex-math notation="LaTeX">(n,n) </tex-math></inline-formula>-multiple secret sharing (MSS) for color images along with its slight ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
8.
  • Swarm Intelligence for Addi... Swarm Intelligence for Additive White Gaussian Noise Level Estimation
    Prasetyo, Heri; Salamah, Umi INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT SYSTEMS, 09/2020, Letnik: 20, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    This paper presents a simple technique for estimating the noise levels in noisy images corrupted by additive white Gaussian noise. The proposed technique modifies the existing ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
9.
  • Improved Beta Chaotic Image... Improved Beta Chaotic Image Encryption for Multiple Secret Sharing
    Guo, Jing-Ming; Riyono, Dwi; Prasetyo, Heri IEEE access, 01/2018, Letnik: 6
    Journal Article
    Recenzirano
    Odprti dostop

    This paper proposes a new simple image encryption technique using the Beta chaotic map for performing the confusion and diffusion of input plain image. This image encryption is further applied to the ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
10.
  • Vulnerability Attacks of SV... Vulnerability Attacks of SVD-Based Video Watermarking Scheme in an IoT Environment
    Prasetyo, Heri; Hsia, Chih-Hsien; Liu, Chin-Hua IEEE access, 01/2020, Letnik: 8
    Journal Article
    Recenzirano
    Odprti dostop

    This study reviews the superiority and limitations of the Singular Value Decomposition (SVD)-based video watermarking scheme. First applies key frame selection to the video sequence to obtain an ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
1 2 3 4 5
zadetkov: 183

Nalaganje filtrov