2021
DOI: 10.1007/s11042-021-10625-5
|View full text |Cite
|
Sign up to set email alerts
|

Essential secret image sharing approach with same size of meaningful shares

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 24 publications
0
7
0
Order By: Relevance
“…However, their approach was unable to achieve lossless recovery of the secret and lacked fault-tolerant capabilities. Several researchers, such as Sardar et al., 11 Wang et al., 12 and Yadav et al., 13 presented schemes having the ability to reconstruct secrets without any loss and possess fault tolerance capabilities. However, the above schemes lack the verification of shares during the reconstruction phase.…”
Section: Related Workmentioning
confidence: 99%
“…However, their approach was unable to achieve lossless recovery of the secret and lacked fault-tolerant capabilities. Several researchers, such as Sardar et al., 11 Wang et al., 12 and Yadav et al., 13 presented schemes having the ability to reconstruct secrets without any loss and possess fault tolerance capabilities. However, the above schemes lack the verification of shares during the reconstruction phase.…”
Section: Related Workmentioning
confidence: 99%
“…Some works on (k, n)-threshold secret image sharing have been proposed [23][24][25][26], in which the secret data can be completely recovered by no less than k shares. However, shadow images are vulnerable to the steganalysis because they are generated based on the same cover image.…”
Section: Introductionmentioning
confidence: 99%
“…Essential participants have higher levels of power than non-essential participants when performing image restoration. This concept has since been implemented by many researchers in different ways [6][7][8][9][10], such as polynomial differentiation in (k, n)-SIS to obtain new polynomials [8]. Considering that a dynamic threshold k has a greater role in some cases, Yuan et al first proposed a polynomial-based image secret sharing scheme with variable thresholds in 2016 [11].…”
Section: Introductionmentioning
confidence: 99%
“…A simple way to implement Lagrange's interpolation and construct the polynomial is by solving a linear system of equations. Many researchers just simply adopted this method in the revealing process of the SIS scheme [1][2][3]5,8,[10][11][12]16,17,19,22,23]. In practice, many secret image pixels and a large amount of data require solving many linear systems until all pixels are recovered.…”
Section: Introductionmentioning
confidence: 99%