Vulnerability attacks of SVD-based video watermarking scheme in an IoT environment

H Prasetyo, CH Hsia, CH Liu - IEEE Access, 2020 - ieeexplore.ieee.org
This study reviews the superiority and limitations of the Singular Value Decomposition (SVD)-
based video watermarking scheme. First applies key frame selection to the video sequence …

An efficient multi-secret image sharing system based on Chinese remainder theorem and its FPGA realization

BK Sharobim, MA Fetteha, SK Abd-El-Hafiz… - IEEE …, 2023 - ieeexplore.ieee.org
Multi-Secret Image Sharing (MSIS) is important in information security when multiple images
are shared in an unintelligible form to different participants, where the images can only be …

Lossless progressive secret sharing for grayscale and color images

H Prasetyo, CH Hsia - Multimedia Tools and Applications, 2019 - Springer
A new technique on progressive secret sharing is presented. The proposed method offers
two different approaches on converting a secret image into a set of shared images. The first …

Batik Image Retrieval Using Maximum Run Length LBP and Sine-Cosine Optimizer

H Prasetyo, JW Simatupang - 2019 International Conference …, 2019 - ieeexplore.ieee.org
This paper investigates the effectiveness of Maximum Run Length (MRL) from Local Binary
Pattern (LBP) for content-based Batik image retrieval system. The MRL of state '1'derived …

A Novel General (n, n)-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain

F Xing, X Yan, L Yu, L Li - Entropy, 2022 - mdpi.com
(k, n)-threshold secret image sharing (SIS) protects an image by dividing it into n shadow
images. The secret image will be recovered as we gather k or more shadow images. In …

A unified system for encryption and multi-secret image sharing using S-box and CRT

BK Sharobim, SK Abd-El-Hafiz… - … on Automation and …, 2022 - ieeexplore.ieee.org
Multi-Secret Image Sharing (MSIS) is used when multiple images need to be shared to
multiple participants, but the images can not be recovered without the presence of all …

Utilizing Emotional Intelligence and Artificial Intelligence to Improve Safety Behavior in Smart Port Operations

SY Kuo, LB Chen - IEEE Transactions on Technology and …, 2024 - ieeexplore.ieee.org
Due to the continuous development of globalization and the new era of the shipping
industry, the smartening of port operations has become an urgent need. However, the …

Progressive secret sharing with adaptive priority and perfect reconstruction

H Prasetyo, CH Hsia, A Wicaksono Hari Prayuda - Journal of Imaging, 2021 - mdpi.com
A new technique for progressive visual secret sharing (PVSS) with adaptive priority weight is
proposed in this paper. This approach employs the bitwise and eXclusive-OR (XOR) based …

Converting (n, n)-multiple secret sharing into more friendly appearance using chinese remainder theorem and boolean operations

H Prasetyo, D Rosiyadi - 2021 International Symposium on …, 2021 - ieeexplore.ieee.org
This paper extends the (n, n)-Multiple Secret Sharing (MSS) into friendlier appearance. This
paper modifies the (n, n)-MSS by utilizing the Chinese Remainder Theorem (CRT) and …

Deep concatenated residual networks for improving quality of halftoning-based BTC decoded image

H Prasetyo, A Wicaksono Hari Prayuda, CH Hsia… - Journal of …, 2021 - mdpi.com
This paper presents a simple technique for improving the quality of the halftoning-based
block truncation coding (H-BTC) decoded image. The H-BTC is an image compression …