2018
DOI: 10.12928/telkomnika.v16i1.6632
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual Cryptography for Security of Handwritten Images

Abstract: The secret sharing is a method to protect confidentiality and integrity of the secret messages b y distrib uting the message shares into several recipients. The secret message could not b e revealed unless the recipients exchange and collect shares to reconstruct the actual message. Even though the attacker ob tain shares shadow during the share exchange, it would b e impossible for the attacker to understand the correct share. There are few algorithms have b een developed for secret sharing, e.g. secret split… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 11 publications
(12 reference statements)
0
1
0
Order By: Relevance
“…Content change in an image is treated as malicious operation. The hash code of original and modified image is drastically different or above prescribed threshold when some malicious changes occur in an image [1][2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…Content change in an image is treated as malicious operation. The hash code of original and modified image is drastically different or above prescribed threshold when some malicious changes occur in an image [1][2][3][4].…”
Section: Introductionmentioning
confidence: 99%