2017
DOI: 10.1007/s11042-017-5293-6
|View full text |Cite
|
Sign up to set email alerts
|

Counting-based secret sharing technique for multimedia applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
75
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3

Relationship

3
6

Authors

Journals

citations
Cited by 145 publications
(80 citation statements)
references
References 16 publications
1
75
0
Order By: Relevance
“…In fact, the timing performance is found common within this authentication study similar in principle to the cryptography security analysis in previous studies of GF(p) hardware modeling [21] as well as elliptic curve GF(2) crypto processors simulations [22]. The security analysis can have different factors to build its test on such as bit-ratio differences found within secret sharing studies [23]. This work testing scope is based on the timing and PSNR assumed to provide fair comparison showing attractive open research improvement over [6].…”
Section: Results and Comparisonssupporting
confidence: 62%
“…In fact, the timing performance is found common within this authentication study similar in principle to the cryptography security analysis in previous studies of GF(p) hardware modeling [21] as well as elliptic curve GF(2) crypto processors simulations [22]. The security analysis can have different factors to build its test on such as bit-ratio differences found within secret sharing studies [23]. This work testing scope is based on the timing and PSNR assumed to provide fair comparison showing attractive open research improvement over [6].…”
Section: Results and Comparisonssupporting
confidence: 62%
“…The lack of security features affects the patient security and privacy. The proposed OLPP method might contribute in extracting the best features for the encryption of the data [48][49][50][51]. Furthermore, the application of proposed method can also be applied to the field of steganography.…”
Section: Discussionmentioning
confidence: 99%
“…Given to the increasing demand for web applications and the continuous growth of a number of networks users involving Cloud computing, E-Government, E-Commerce, E-Business, online banking services, which all contain sensitive information, it may be vulnerable to theft or access by wrong persons or even destroyed by hackers or service providers as non-trusted agencies in many cases. Therefore, there is an urgent need for information security with its three main components: Confidentiality, Integrity, and Availability (CIA) [1].…”
Section: Introductionmentioning
confidence: 99%
“…In fact, the security techniques, i.e. cryptography and steganography, focus on the phenomena that one person is in the controlling seat who is in charge of the secrecy of information [1]. However, the question is what happens when the encrypted or hidden data are corrupted, or the secret key is lost.…”
Section: Introductionmentioning
confidence: 99%