Multi-secret Image Sharing Scheme based on coding method
نویسندگان
چکیده
منابع مشابه
A multi-threshold secret image sharing scheme based on MSP
0167-8655/$ see front matter 2012 Published by http://dx.doi.org/10.1016/j.patrec.2012.04.010 ⇑ Corresponding author. Address: Department of Computer Science, Feng Chia University, No. 100 We 40724, Taiwan. Tel.: +886 4 24517250x3790; fax: +8 E-mail addresses: [email protected] (C. Guo Chang). In this paper, we consider the problem of secret image sharing in groups with multi-threshold access s...
متن کاملCRT Based Threshold Multi Secret Sharing Scheme
This paper presents a novel secret sharing system that is based on Chinese remainder theorem. This scheme deals with a concept of multiple secrets to be shared to different groups, such that each group receives shares of secret intended for it. The sharing is a threshold scheme, that is more than a fixed number of members from any particular group, will be able to reconstruct the secret and any...
متن کاملNonlinear Secret Image Sharing Scheme
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique ...
متن کاملSecret Image Sharing Scheme Based on Pixel Replacement
This is to certify that Indira Naskar has completed her dissertation entitled " (n,n) Secret Image Sharing Scheme Based On Pixel Replacement " , under the supervision and guidance of Mrs 700091. We are satisfied with her work, which is being presented for the partial fulfillment of the The foregoing thesis is hereby approved as a creditable study of M.Tech in IT (Courseware Engineering) and pre...
متن کاملA Secret Image Sharing Scheme Based on Vector Quantization Mechanism
In this paper, we proposed an image sharing method adopting (t, n) threshold scheme. The secret image goes through Vector Quantization (VQ) scheme and permutes the locations of indices to obtain permuted indexed secret image. We select t indices to form a (t-1)-degree polynomial by taking t indices as its coefficients. Then, the values of blocks’ indices in cover image are fed into the (t-1)-de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOP Conference Series: Materials Science and Engineering
سال: 2019
ISSN: 1757-899X
DOI: 10.1088/1757-899x/631/5/052043