Results 1 to 10 of about 3,112 (196)

Nonlinear secret image sharing scheme. [PDF]

open access: yesScientificWorldJournal, 2014
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack.
Shin SH, Lee GJ, Yoo KY.
europepmc   +5 more sources

Meaningful Secret Image Sharing with Saliency Detection. [PDF]

open access: yesEntropy (Basel), 2022
Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed cloud storage. In traditional secret image sharing schemes, noise-like shadows introduce difficulties into shadow management and increase the ...
Cheng J, Yan X, Liu L, Jiang Y, Wang X.
europepmc   +5 more sources

Reversible Image Secret Sharing [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2020
In reversible image secret sharing (RISS), the cover image can be recovered to some degree, and a share can be comprehensible rather than noise-like. Reversible cover images play an important role in law enforcement and medical diagnosis. The comprehensible share can not only reduce the suspicion of attackers but also improve the management efficiency ...
Xuehu Yan   +3 more
openaire   +1 more source

Ramp secret image sharing

open access: yesMathematical Biosciences and Engineering, 2019
Secret image sharing (SIS) belongs to but differs from secret sharing. In general, conventional (k,n) threshold SIS has the shortcoming of "all-or-nothing". In this article, first we introduce ramp SIS definition. Then we propose a (k1,k2,n) ramp SIS based on the Chinese remainder theorem (CRT).
Xuehu Yan   +4 more
openaire   +4 more sources

Image inpainting-based behavior image secret sharing

open access: yesMathematical Biosciences and Engineering, 2020
<abstract> <p>The polynomial-based image secret sharing (ISS) scheme encodes a secret image into <italic>n</italic> shadows assigned to <italic>n</italic> participants. The secret image with high resolution is decoded by Lagrange interpolation when collecting any <italic>k</italic> or more shadows ...
Xuehu Yan   +4 more
openaire   +4 more sources

Adaptive Partial Image Secret Sharing [PDF]

open access: yesSymmetry, 2020
In contrast to encrypting the full secret image in classic image secret sharing (ISS), partial image secret sharing (PISS) only encrypts part of the secret image due to the situation that, in general, only part of the secret image is sensitive or secretive.
Xuehu Yan   +3 more
openaire   +1 more source

Analysis of Secret Image Sharing using Shared Image

open access: yesInternational Journal of Computer Applications, 2014
secret image sharing scheme with steganography lacks to provide the authentication, quality of stego-image and more cheating done by the dishonest participants. So, a secret image sharing using shared image technique is proposed to prevent the participants from the subsidiary stipulation of a false stego-image (an image containing the hidden secret ...
R.K.Selva Kumar, I. EdwinDayanand
openaire   +1 more source

Colour image secret sharing

open access: yesElectronics Letters, 2004
A secret sharing scheme suitable for encrypting colour images is introduced. The required colour shares are obtained during encryption by operating at the bit-levels. Perfect reconstruction is achieved by the decryption module using only logical operations.
R. Lukac, K.N. Plataniotis
openaire   +1 more source

Threshold Secret Image Sharing [PDF]

open access: yes, 2013
A (k,n) threshold secret image sharing scheme, abbreviated as (k,n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret image exactly. In 2002, for (k,n)-TSISS, Thien and Lin reduced the size of each shadow image to $\frac{1}{k}$ of the original secret image.
Teng Guo   +5 more
openaire   +1 more source

A novel secret sharing scheme using multiple share images

open access: yesMathematical Biosciences and Engineering, 2019
Secret image sharing has been widely applied in numerous areas, such as military imaging systems, remote sensing, and so on. One of the problems for image sharing schemes is to efficiently recover original images from their shares preserved by the shareholders.
Xiaoping Li   +3 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy