2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT) 2018
DOI: 10.1109/icicct.2018.8473323
|View full text |Cite
|
Sign up to set email alerts
|

Boolean-based Multi Secret Sharing Scheme using Meaningful Shares

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…The scheme proposed is compared with schemes in [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21] with respect to properties such as intelligible shares, authentication for cheating prevention, number of secret images shared, restriction on v and z, and lossless recovery of secret images as shown in Table 3. A number of secret images shared, for schemes in [12,14,18], are written as 'Multiple'.…”
Section: Comparisonmentioning
confidence: 99%
See 4 more Smart Citations
“…The scheme proposed is compared with schemes in [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21] with respect to properties such as intelligible shares, authentication for cheating prevention, number of secret images shared, restriction on v and z, and lossless recovery of secret images as shown in Table 3. A number of secret images shared, for schemes in [12,14,18], are written as 'Multiple'.…”
Section: Comparisonmentioning
confidence: 99%
“…The existing schemes briefed so far have the following limitations: (i) identification and management of shares are difficult due to their noisy nature [1,[4][5][6][7][8]10,11,[13][14][15][16][17][18][19]21]; (ii) extra verification shares are generated for authentication which consume extra storage space [14,15,17]; (iii) difficult to find the reference points of rotation for shares carrying multiple secret images data [12]; (iv) shares have to be circumvolved in a specific way to reconstruct each of the multiple secret images [12] [5,[15][16][17]20,21]; (vi) the number of shares to be created is dependent on the number of secret images to be shared [15][16][17]20,21]; and (vii) need of ordered consecutive shares to recover the secret images [15][16][17][19][20][21]. In addition to overcoming the abovementioned limitations, the proposed scheme has other advantages as follows: (i) maximum of m/2 secret images are shared using z shares, m being the pixel expansion, (ii) lossless recovery of all m/2 secret images using at least v shares; (iii) only one-time authentication for the recovering of all m/2 shared secret images; and (iv) resistant to different kinds of cheating and cheaters mentioned in [3].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations