2012 5th International Congress on Image and Signal Processing 2012
DOI: 10.1109/cisp.2012.6469950
|View full text |Cite
|
Sign up to set email alerts
|

Secret image sharing using (t,n) threshold scheme with lossless recovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Shamir introduced SS and proposed a scheme based on polynomial interpolation [26], which has been applied in images as PSIS. With simple operation, PSIS is realized by a random (k − 1)-degree polynomial from Shamir's idea, shown as Equation (1). There are prime p and k coefficients denoted by a 0 , a 1 , • • • , a k−1 .…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…Shamir introduced SS and proposed a scheme based on polynomial interpolation [26], which has been applied in images as PSIS. With simple operation, PSIS is realized by a random (k − 1)-degree polynomial from Shamir's idea, shown as Equation (1). There are prime p and k coefficients denoted by a 0 , a 1 , • • • , a k−1 .…”
Section: Preliminariesmentioning
confidence: 99%
“…Secret image sharing (SIS) is a significant branch in multi-party security cryptosystems [1,2], which originates from secret sharing (SS) introduced by Shamir in 1979. (k, n)threshold SS can process private data into n shares managed by different members.…”
Section: Introductionmentioning
confidence: 99%
“…It is also possible to create more complex solutions, including hierarchical [ 10 ], expandable [ 11 , 12 ] or multistage systems [ 13 ]. A majority of schemes use numeric secrets, but there are exceptions, for example matrices [ 14 , 15 ] or images [ 16 ].…”
Section: Secret Sharingmentioning
confidence: 99%
“…A RGB color image still maintains good visual quality, when modified the least four bit of each bit plane. However, previous developed image secret sharing [5][6][7][8] do not consider the fact that the digital images with high redundancy characteristics. Those schemes just divide a digital image with a general secret sharing for data.…”
Section: Introductionmentioning
confidence: 97%