Results 1 to 10 of about 3,112 (196)
Nonlinear secret image sharing scheme. [PDF]
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack.
Shin SH, Lee GJ, Yoo KY.
europepmc +5 more sources
Meaningful Secret Image Sharing with Saliency Detection. [PDF]
Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed cloud storage. In traditional secret image sharing schemes, noise-like shadows introduce difficulties into shadow management and increase the ...
Cheng J, Yan X, Liu L, Jiang Y, Wang X.
europepmc +5 more sources
Reversible Image Secret Sharing [PDF]
In reversible image secret sharing (RISS), the cover image can be recovered to some degree, and a share can be comprehensible rather than noise-like. Reversible cover images play an important role in law enforcement and medical diagnosis. The comprehensible share can not only reduce the suspicion of attackers but also improve the management efficiency ...
Xuehu Yan +3 more
openaire +1 more source
Secret image sharing (SIS) belongs to but differs from secret sharing. In general, conventional (k,n) threshold SIS has the shortcoming of "all-or-nothing". In this article, first we introduce ramp SIS definition. Then we propose a (k1,k2,n) ramp SIS based on the Chinese remainder theorem (CRT).
Xuehu Yan +4 more
openaire +4 more sources
Image inpainting-based behavior image secret sharing
<abstract> <p>The polynomial-based image secret sharing (ISS) scheme encodes a secret image into <italic>n</italic> shadows assigned to <italic>n</italic> participants. The secret image with high resolution is decoded by Lagrange interpolation when collecting any <italic>k</italic> or more shadows ...
Xuehu Yan +4 more
openaire +4 more sources
Adaptive Partial Image Secret Sharing [PDF]
In contrast to encrypting the full secret image in classic image secret sharing (ISS), partial image secret sharing (PISS) only encrypts part of the secret image due to the situation that, in general, only part of the secret image is sensitive or secretive.
Xuehu Yan +3 more
openaire +1 more source
Analysis of Secret Image Sharing using Shared Image
secret image sharing scheme with steganography lacks to provide the authentication, quality of stego-image and more cheating done by the dishonest participants. So, a secret image sharing using shared image technique is proposed to prevent the participants from the subsidiary stipulation of a false stego-image (an image containing the hidden secret ...
R.K.Selva Kumar, I. EdwinDayanand
openaire +1 more source
A secret sharing scheme suitable for encrypting colour images is introduced. The required colour shares are obtained during encryption by operating at the bit-levels. Perfect reconstruction is achieved by the decryption module using only logical operations.
R. Lukac, K.N. Plataniotis
openaire +1 more source
Threshold Secret Image Sharing [PDF]
A (k,n) threshold secret image sharing scheme, abbreviated as (k,n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret image exactly. In 2002, for (k,n)-TSISS, Thien and Lin reduced the size of each shadow image to $\frac{1}{k}$ of the original secret image.
Teng Guo +5 more
openaire +1 more source
A novel secret sharing scheme using multiple share images
Secret image sharing has been widely applied in numerous areas, such as military imaging systems, remote sensing, and so on. One of the problems for image sharing schemes is to efficiently recover original images from their shares preserved by the shareholders.
Xiaoping Li +3 more
openaire +4 more sources

