2019
DOI: 10.1007/s11042-019-07807-7
|View full text |Cite
|
Sign up to set email alerts
|

An efficient Boolean based multi-secret image sharing scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 44 publications
0
7
0
Order By: Relevance
“…In this section, some properties of the XOR operation are briefly defined. 34,35 If A and B are binary numbers, the operation ⊕ satisfies the following conditions:…”
Section: Xor Propertiesmentioning
confidence: 99%
“…In this section, some properties of the XOR operation are briefly defined. 34,35 If A and B are binary numbers, the operation ⊕ satisfies the following conditions:…”
Section: Xor Propertiesmentioning
confidence: 99%
“…A simple multi-secret image share scheme has been proposed by Chattopadhyay et al [6] that uses a stable hash function and Boolean operations. Nag et al [32] have designing a framework for multi-secret image sharing based on XOR when t is not limited only to 2 or n. In order to generate r (where r is the number of qualify subgroups) they have used nalters of the same size as confidential image size to distribute images publicly using XOR operations. Alkhodaidi et al [3] also proposed a technique which adds the technique of image steganography to the counting-based secret-sharing method to obtain more relevant security.…”
Section: Related Workmentioning
confidence: 99%
“…The lower the amount of time, the better for a typical end-user. Because of the time needed for the CPU clock Ref [6] R e f [ 32] R e f [ 3] R e f [ Table 5 (continued)…”
Section: Encryption/ Decryption Timementioning
confidence: 99%
See 1 more Smart Citation
“…In addition to hierarchical schemes, many researchers have proposed various multi-secret image sharing schemes based on different technologies. For example, the Chinese remainder theorem [10], Boolean [27][28][29], and cellular automaton [30] have been proposed. In 2017, Yuan et al [31] first applied the adjustable threshold into secret image sharing, and they proposed the first adjustable-threshold secret image scheme.…”
Section: Related Workmentioning
confidence: 99%