An Image Secret Sharing Method Based on Shamir Secret Sharing
نویسندگان
چکیده
منابع مشابه
Secret Image Sharing based on Wavelet Transform
Visual cryptography is a secure technique enable distributing sensitive visual data to participant through public communication channels. In visual cryptography a secret image is cryptographically encrypted into some shares (transparencies) such that the generated secure shares do not reveal any information without they are not combined in prescribed way. The main challenges facing secure image...
متن کاملOn Secret Multiple Image Sharing
In traditional secret sharing schemes for general access structures, a secret can be encoded into n sets of (shadow, key)’s which are distributed to n participants one by one. Only those participants belonging to a pre-defined qualified subset can recover the shared secret by using their (shadow, key)’s. The size of (shadow, key)’s may be different for different participants. This problem exist...
متن کاملAn Investigation on Image Secret Sharing
Numerous multimedia applications and communications are rapidly growing through the Internet. Because most of these multimedia communications are confidential and cannot be known by unauthorized users, secret image sharing has become a key technology for digital images in secured storage and confidential transmission. The ultimate objectives of secret sharing include transparency, authority (re...
متن کاملThreshold Secret Image Sharing
A (k, n) threshold secret image sharing scheme, abbreviated as (k, n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret image exactly. In 2002, for (k, n)-TSISS, Thien and Lin reduced the size of each shadow image to 1 k of the original secret image. Their main technique is by adopting all coefficients of a (k − 1)-deg...
متن کاملWeighted modulated secret image sharing method
bstract. We present a novel hybrid method that includes a moduated scheme for reducing the distortion of the reconstructed image nd a two-layered structure for grouping participants with different eights in a secret image sharing problem. Conventional secret imge sharing methods suffer from truncation distortion, which is the ifference between a pixel value and its truncated result. We first re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Current Trends in Computer Sciences & Applications
سال: 2018
ISSN: 2643-6744
DOI: 10.32474/ctcsa.2018.01.000106