2015
DOI: 10.1007/s11042-015-2634-1
|View full text |Cite
|
Sign up to set email alerts
|

Highly efficient and secure multi-secret image sharing scheme

Abstract: This paper presents a novel highly efficient secret image sharing scheme that is symmetric, Boolean-based, secure, and enables multi-secret image sharing. The proposed (n, n) scheme involves sharing n secret images among n shared images and recovers all n secret images from n shared images, and losing any shared image prevents recovering any secret image. We propose a novel symmetric sharing-recovery function (SSRF) for performing sharing and recovery. The scheme is based on Boolean operations to attain low co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…Section 2.2 introduces the method proposed by Chen and Wu [16]. Section 2.3 introduces the method proposed by Chen et al [17].…”
Section: Review Of Related Literaturementioning
confidence: 99%
See 3 more Smart Citations
“…Section 2.2 introduces the method proposed by Chen and Wu [16]. Section 2.3 introduces the method proposed by Chen et al [17].…”
Section: Review Of Related Literaturementioning
confidence: 99%
“…Since the random image does not need to be shared as shared images, the sharing capacity is increased. Chen et al [17] proposed a method that also used the random number image generation function to generate images containing random noise but will perform further bit shift processing on the generated random images. Kabirirad and Eslami [18] proposed a multi secret image sharing scheme based on Boolean operations.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Shares are generated by using the Pseudo randomized VC technique that involves the following steps [18], [19] Input: Encrypted image F Output: Share1, Share2…”
Section: Share Generation By Vcmentioning
confidence: 99%