A new grayscale image encryption algorithm based on , threshold secret sharing is proposed. The scheme allows a secret image to be transformed into n shares, where any shares can be used to reconstruct the secret image, while the knowledge of 1 or fewer shares leaves no sufficient information about the secret image and it becomes hard to decrypt the transmitted image. In the proposed scheme, the pixels of the secret image are first permuted and then encrypted by using quadratic residues. In the final stage, the encrypted image is shared into n shadow images using polynomials of Shamir scheme. The proposed scheme is provably secure and the experimental results shows that the scheme performs well while maintaining high levels of quality...
Most of today’s secret image sharing technologies are based on the polynomial-based secret sha...
This paper presents two new constructions for the secret color images sharing schemes .One is a (n, ...
[[abstract]]A novel approach to secret image sharing based on a (k,n)-threshold scheme with the addi...
[[abstract]]This study proposes a new secret image sharing method based on the (t,n)-threshold. The ...
In this era of online communication, which transacts data in 0s and 1s, confidentiality is a priced ...
Thien-and-Lin’s polynomial-based secret image sharing (PSIS) is utilized as the basic method t...
In this paper a novel (t, n) threshold image secret sharing scheme is proposed. Based on the idea th...
Visual Cryptography Scheme (VCS) is an encryption method that works on human visual system. It encry...
This paper proposed a highly secure secret sharing scheme for mul-timedia image communication. The p...
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's tech...
A new secret sharing scheme for color images is introduced. Using the {k,n}-secret sharing strategy ...
[[abstract]]A novel approach to secret image sharing based on a (k,n)-threshold scheme with the addi...
Visual cryptography (VC) encrypts a secret image into n shares (transparency). As such, we cannot se...
Secure digital images is very important for today’s scenario which combining methods and techniques ...
Abstract In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-...
Most of today’s secret image sharing technologies are based on the polynomial-based secret sha...
This paper presents two new constructions for the secret color images sharing schemes .One is a (n, ...
[[abstract]]A novel approach to secret image sharing based on a (k,n)-threshold scheme with the addi...
[[abstract]]This study proposes a new secret image sharing method based on the (t,n)-threshold. The ...
In this era of online communication, which transacts data in 0s and 1s, confidentiality is a priced ...
Thien-and-Lin’s polynomial-based secret image sharing (PSIS) is utilized as the basic method t...
In this paper a novel (t, n) threshold image secret sharing scheme is proposed. Based on the idea th...
Visual Cryptography Scheme (VCS) is an encryption method that works on human visual system. It encry...
This paper proposed a highly secure secret sharing scheme for mul-timedia image communication. The p...
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's tech...
A new secret sharing scheme for color images is introduced. Using the {k,n}-secret sharing strategy ...
[[abstract]]A novel approach to secret image sharing based on a (k,n)-threshold scheme with the addi...
Visual cryptography (VC) encrypts a secret image into n shares (transparency). As such, we cannot se...
Secure digital images is very important for today’s scenario which combining methods and techniques ...
Abstract In a (k,n) threshold secret image sharing scheme, a secret image is encrypted into n image-...
Most of today’s secret image sharing technologies are based on the polynomial-based secret sha...
This paper presents two new constructions for the secret color images sharing schemes .One is a (n, ...
[[abstract]]A novel approach to secret image sharing based on a (k,n)-threshold scheme with the addi...