2014
DOI: 10.1016/j.sigpro.2013.12.022
|View full text |Cite
|
Sign up to set email alerts
|

Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(17 citation statements)
references
References 18 publications
0
17
0
Order By: Relevance
“…In order to evaluate the performances of the proposed construction with respect to the already proposed schemes, we implemented the images sharing approach proposed in Thien and Lin (2002) based on Shamir's scheme, and a CRTbased approach adapted from Chang et al (2014). Implementation of the experimented approaches was performed using Delphi 6, and experimented on an i7-2600 3.40 Ghz platform.…”
Section: Experiments and Performances Resultsmentioning
confidence: 99%
“…In order to evaluate the performances of the proposed construction with respect to the already proposed schemes, we implemented the images sharing approach proposed in Thien and Lin (2002) based on Shamir's scheme, and a CRTbased approach adapted from Chang et al (2014). Implementation of the experimented approaches was performed using Delphi 6, and experimented on an i7-2600 3.40 Ghz platform.…”
Section: Experiments and Performances Resultsmentioning
confidence: 99%
“…The CRT [22][23][24], resulting from Bézout's Lemma [25], is an approach to determine an integer in a specific range by the given system of simultaneous congruencies in number theory. CRT is used as a main building block in our proposed scheme and described as follows.…”
Section: Chinese Remainder Theoremmentioning
confidence: 99%
“…CRT can make a solution to determine an integer by the given system of simultaneous congruencies in number theory. Nowadays, CRT is used extensively in secret sharing and other applications of information security [22][23][24]. Fortunately, we also find that CRT is very suitable for data hiding.…”
Section: Introductionmentioning
confidence: 98%
“…The resultant shadow size is N/k. In 2014, Chang et al [4] proposed a multi-image sharing scheme based on Chinese remainder theorem and Lagrange interpolation. All secret images have the same size.…”
Section: Introductionmentioning
confidence: 99%