Secret image sharing schemes: A comprehensive survey
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …
an issue of utmost importance as a direct result of the rapid development of network …
A verifiable threshold secret image sharing (SIS) scheme with combiner verification and cheater identification
AV Soreng, S Kandar - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Image transmission is gaining importance with the advancement of information
communication technology. Transmission of sensitive images in diverse applications like …
communication technology. Transmission of sensitive images in diverse applications like …
Holographic encryption algorithm based on bit-plane decomposition and hyperchaotic Lorenz system
J Li, L Chen, W Cai, J Xiao, J Zhu, Y Hu… - Optics & Laser …, 2022 - Elsevier
In recent years, many encryption algorithms based on chaotic systems have developed
rapidly, and most of them only have simple confusion-diffusion structures, which only work …
rapidly, and most of them only have simple confusion-diffusion structures, which only work …
Single secret sharing scheme using chinese remainder theorem, modified Shamir's scheme and XOR operation
The existing scheme uses lightweight modular arithmetic and Boolean operations for the
secret sharing scheme by compromising minor degradation in security with less computation …
secret sharing scheme by compromising minor degradation in security with less computation …
XOR-based visual secret sharing scheme using pixel vectorization
SP Kannojia, J Kumar - Multimedia Tools and Applications, 2021 - Springer
The XOR operation has improved the recovery effect of the visual secret sharing schemes.
Various visual secret sharing schemes based on XOR operation are available in the …
Various visual secret sharing schemes based on XOR operation are available in the …
Tree parity machine guided patients' privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19
A Sarkar, M Sarkar - Multimedia Tools and Applications, 2021 - Springer
In the COVID-19 pandemic, telehealth plays a significant role in the e-healthcare. E-health
security risks have also risen significantly with the rise in the use of telehealth. This paper …
security risks have also risen significantly with the rise in the use of telehealth. This paper …
An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares
A secret sharing scheme partitions a secret into a set of shares and distributes them among
the eligible participants, with each participant receiving one share of the secret. The sharing …
the eligible participants, with each participant receiving one share of the secret. The sharing …
Secured communication method using visual secret sharing scheme for color images
J Blesswin, M Kumar - Journal of Internet Technology, 2021 - jit.ndhu.edu.tw
Protecting Personally identifiable information (PII) and Protected health Information (PHI) is
always challenging in this digital era. An ongoing global pandemic of coronavirus disease …
always challenging in this digital era. An ongoing global pandemic of coronavirus disease …
NS4: a Novel Security approach for extracted video keyframes using Secret Sharing Scheme
Due to the vast employment and high impacts of videos in the multimedia era, video security
has become a key research area in multimedia security. Hence, it is necessary to prevent …
has become a key research area in multimedia security. Hence, it is necessary to prevent …
BEMSS-Blockwise Encryption based multi secret sharing scheme for securing visual content
In recent years, the significant research area in the domain of multimedia security is image
information security. This can be provided by converting it into a secret code through the …
information security. This can be provided by converting it into a secret code through the …