2019
DOI: 10.1109/access.2019.2902853
|View full text |Cite
|
Sign up to set email alerts
|

A Note on Multiple Secret Sharing Using Chinese Remainder Theorem and Exclusive-OR

Abstract: This paper reviews the former existing scheme on (n, n)-multiple secret sharing (MSS) for color images along with its slight limitation. This scheme generates a set of n shared images from a set of n secret images using the Chinese remainder theorem (CRT) and Boolean exclusive-OR (XOR) operation. This scheme works well if the number of secret images n is even number. However, the former scheme has a slight problem while the number of secret images n is an odd number. This paper proposes a new technique to over… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
23
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 31 publications
(24 citation statements)
references
References 22 publications
1
23
0
Order By: Relevance
“…Figure 3 presents the relationships between P A (M ) and θ GT for various image sizes. This figure confirms that the noise level θ can be considered as a simple linear function with P A (M ), as indicated in (12). Subsequently, the noise levels were estimated for all images in each training set.…”
Section: Performance Of Swarm Intelligencesupporting
confidence: 76%
See 3 more Smart Citations
“…Figure 3 presents the relationships between P A (M ) and θ GT for various image sizes. This figure confirms that the noise level θ can be considered as a simple linear function with P A (M ), as indicated in (12). Subsequently, the noise levels were estimated for all images in each training set.…”
Section: Performance Of Swarm Intelligencesupporting
confidence: 76%
“…However, such noise level estimation requires a scalar value of α. In a previous scheme [6], the value of α was simply computed by applying the LSF method in (12) to a set of training images, where different image sizes yield different scalar values.…”
Section: Svd-based Noise Level Estimationmentioning
confidence: 99%
See 2 more Smart Citations
“…Multimedia data often consists of confidential information or secret valued messages. Several attempts have been developed to protect multimedia data, such as digital image watermarking [1]- [19], secret sharing [20]- [22], etc. These aforementioned methods show promising results in securing multimedia data.…”
Section: Introductionmentioning
confidence: 99%