Secret image sharing schemes: A comprehensive survey

S Saha, AK Chattopadhyay, AK Barman, A Nag… - IEEE …, 2023 - ieeexplore.ieee.org
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …

A verifiable threshold secret image sharing (SIS) scheme with combiner verification and cheater identification

AV Soreng, S Kandar - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Image transmission is gaining importance with the advancement of information
communication technology. Transmission of sensitive images in diverse applications like …

Holographic encryption algorithm based on bit-plane decomposition and hyperchaotic Lorenz system

J Li, L Chen, W Cai, J Xiao, J Zhu, Y Hu… - Optics & Laser …, 2022 - Elsevier
In recent years, many encryption algorithms based on chaotic systems have developed
rapidly, and most of them only have simple confusion-diffusion structures, which only work …

Single secret sharing scheme using chinese remainder theorem, modified Shamir's scheme and XOR operation

D Pande, AS Rawat, M Deshmukh, M Singh - Wireless Personal …, 2023 - Springer
The existing scheme uses lightweight modular arithmetic and Boolean operations for the
secret sharing scheme by compromising minor degradation in security with less computation …

XOR-based visual secret sharing scheme using pixel vectorization

SP Kannojia, J Kumar - Multimedia Tools and Applications, 2021 - Springer
The XOR operation has improved the recovery effect of the visual secret sharing schemes.
Various visual secret sharing schemes based on XOR operation are available in the …

Tree parity machine guided patients' privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19

A Sarkar, M Sarkar - Multimedia Tools and Applications, 2021 - Springer
In the COVID-19 pandemic, telehealth plays a significant role in the e-healthcare. E-health
security risks have also risen significantly with the rise in the use of telehealth. This paper …

An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares

AK Chattopadhyay, A Nag, JP Singh - Multimedia Tools and Applications, 2022 - Springer
A secret sharing scheme partitions a secret into a set of shares and distributes them among
the eligible participants, with each participant receiving one share of the secret. The sharing …

Secured communication method using visual secret sharing scheme for color images

J Blesswin, M Kumar - Journal of Internet Technology, 2021 - jit.ndhu.edu.tw
Protecting Personally identifiable information (PII) and Protected health Information (PHI) is
always challenging in this digital era. An ongoing global pandemic of coronavirus disease …

NS4: a Novel Security approach for extracted video keyframes using Secret Sharing Scheme

S Kashid, LK Awasthi, K Kumar… - … conference on computer …, 2023 - ieeexplore.ieee.org
Due to the vast employment and high impacts of videos in the multimedia era, video security
has become a key research area in multimedia security. Hence, it is necessary to prevent …

BEMSS-Blockwise Encryption based multi secret sharing scheme for securing visual content

P Saini, K Kumar, S Kashid, A Dhiman… - 2022 IEEE 9th Uttar …, 2022 - ieeexplore.ieee.org
In recent years, the significant research area in the domain of multimedia security is image
information security. This can be provided by converting it into a secret code through the …