• Nenhum resultado encontrado

Ramp Secret Sharing Approach to Authentication and Data Repairing For Document Image

N/A
N/A
Protected

Academic year: 2016

Share "Ramp Secret Sharing Approach to Authentication and Data Repairing For Document Image "

Copied!
6
0
0

Texto

Loading

Referências

Documentos relacionados

In order to do that, the communication protection mechanism modifies the Challenge-Handshake Authentication Protocol (CHAP) which is responsible for the authentication

The data coming from the subsystems defined by the block partition in the Block Cimmino method are gathered in an unique block diagonal sparse matrix which is analysed, distributed

Para mim não haveria sentido em minha produção como professor sem uma produção artística e sem uma relação com o campo artístico (relação nem sempre fácil), pois

The particular threefold case is used to analyze data on eigenfrequencies of elastomechanical vibration of an anisotropic quartz block..

Visual cryptography is used along with the concept of halftoning where the continuous-tone image is first transformed into a binary image by using error diffusion

In this work, we have proposed a new method for image illumination enhancement which is inspired from HVS in order to divide the image into several locals and then each local

The main purpose of the paper is to provide an overview of the architecture of the Kerberos authentication service and using the Kerberos authentication services in Wireless

First we are separating the image into R, G, B planes and then decomposing the image plane into 4 blocks and applying DCT transform over row mean vectors of each block