2020
DOI: 10.1049/ise2.12001
|View full text |Cite
|
Sign up to set email alerts
|

A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography

Abstract: Researchers have put forward many variations of schemes for secret image sharing on grounds of visual cryptography and polynomials. The authors of this paper put forward a novel scheme for sharing multiple secret images with perfect reconstruction and authentication for cheating prevention. The perfect reconstruction of all shared secret images is obtained by applying polynomial-based encryption and decryption, and one-time authentication is done for all shared secret images by stacking the intelligible shares… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…When we need to renew based on the original SS, we first need to share the intermediate variable b 0 . The threshold for renewal sharing is (k 2 , n 2 ), and the formula of the SS for sharing intermediate variable b 0 satisfies Equation (3).…”
Section: Renewal Sharingmentioning
confidence: 99%
See 3 more Smart Citations
“…When we need to renew based on the original SS, we first need to share the intermediate variable b 0 . The threshold for renewal sharing is (k 2 , n 2 ), and the formula of the SS for sharing intermediate variable b 0 satisfies Equation (3).…”
Section: Renewal Sharingmentioning
confidence: 99%
“…The renewal target is Figure 1c, and its renewed shadow is Figure 6b. The image reconstructed by selecting the renewed shadows with serial numbers X = [3,4] is Figure 6c, which does not get any information. Figure 6d can be obtained by reconstructing the secret image through the renewed shadow, and the serial number is X = [3,4].…”
Section: F I G U R Ementioning
confidence: 99%
See 2 more Smart Citations
“…Two matrices must have the following properties for secret sharing to be efficient. 36,37 1) If we call the vector obtained by stacking any π‘˜ rows out of 𝑛 rows in matrix 𝑀 0 as 𝑉 0 and k rows out of n rows in matrix 𝑀 1 as 𝑉 1 . It should be 𝐻(𝑉 0 ) < 𝐻(𝑉 1 ) where 𝐻(𝑉 ) is hamming weight function.…”
Section: Visual Secret Sharingmentioning
confidence: 99%