2016
DOI: 10.1016/j.dsp.2015.12.004
|View full text |Cite
|
Sign up to set email alerts
|

Essential secret image sharing scheme with the same size of shadows

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 50 publications
(23 citation statements)
references
References 29 publications
0
20
0
Order By: Relevance
“…Hence, 'No' concatenation of sub-shadows is better than 'Yes'. As shown in Table 4, only the proposed scheme and Chen et al's scheme [25] do not need the concatenation operation in the sharing process, which is better than Yang et al's scheme [21], Chen and Chen's [23], Li et al's scheme [24], and Chen's scheme [26].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Hence, 'No' concatenation of sub-shadows is better than 'Yes'. As shown in Table 4, only the proposed scheme and Chen et al's scheme [25] do not need the concatenation operation in the sharing process, which is better than Yang et al's scheme [21], Chen and Chen's [23], Li et al's scheme [24], and Chen's scheme [26].…”
Section: Discussionmentioning
confidence: 99%
“…Note: The smaller size of the shadows is better during storage and transmission. Table 2 shows the proposed scheme has a better performance on shadows' size than Li et al's scheme [24] and Chen et al's scheme [25]. Figure 6 also shows that the proposed scheme has a smaller size ratio than Chen's scheme [26].…”
Section: Comparisonmentioning
confidence: 92%
See 1 more Smart Citation
“…Additionally, by embedding the hash-based message the three types of cheating will probably be detected Moreover, they improve the security by using a random strategy with dynamic embedding. This scheme and [16] divided the shadow or image to a group.…”
Section: Using Secret Sharing Mechanism To Secure Imagesmentioning
confidence: 99%
“…To date, many researchers have been involved in the development of this field. According to the techniques used, secret image sharing has many branches, including polynomial-based secret image sharing [1] [3], visual cryptography [4] [5], Boolean operation-based secret image sharing [6], cellular automaton-based secret image sharing [7] [8], Chinese Reminder Theorem-based secret image sharing [9] [10] [11] and so on.…”
mentioning
confidence: 99%