2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2015
DOI: 10.1109/icacci.2015.7275922
|View full text |Cite
|
Sign up to set email alerts
|

A novel 3–4 image secret sharing scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Hence, though one or two bits are corrupted in this experiment, original bit is recovered with the help of remaining bits. Such methods are called as secret sharing approaches (Roy et al, 2015;Tuncer and Avci, 2016;Avci et al, 2016;Hsieh et al, 2007;Hsieh et al, 2008). In this work, we generate secret shared image based on concepts of Hsieh et al (2007) and Hsieh et al (2008), but we use deep-neural networks to generate a shared image instead of using tabular comparison, as it needs lot of computations and comparison.…”
Section: Secret Share Generationmentioning
confidence: 99%
“…Hence, though one or two bits are corrupted in this experiment, original bit is recovered with the help of remaining bits. Such methods are called as secret sharing approaches (Roy et al, 2015;Tuncer and Avci, 2016;Avci et al, 2016;Hsieh et al, 2007;Hsieh et al, 2008). In this work, we generate secret shared image based on concepts of Hsieh et al (2007) and Hsieh et al (2008), but we use deep-neural networks to generate a shared image instead of using tabular comparison, as it needs lot of computations and comparison.…”
Section: Secret Share Generationmentioning
confidence: 99%
“…A new approach [3,4] image secret sharing scheme has been proposed in [15]. The approach made use of actual concept of cryptography over 2x2 blocks of data.…”
Section: Generic Solutions To Privacy and Security Using Visual Cryptmentioning
confidence: 99%
“…Visual Cryptography Security and privacy [12], [13], [14] Image secret sharing scheme Security and privacy [15] various parameters which is important to measure the security of cloud services. In order to calculate security and validity of model cloud service alliance [CSA] is used.…”
Section: Proposed Work Focus Referencesmentioning
confidence: 99%
See 1 more Smart Citation