2020
DOI: 10.1007/s11042-019-08524-x
|View full text |Cite
|
Sign up to set email alerts
|

Multiple secret image sharing with general access structure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…(i) B1: generate an k × k orthonormal matrix LM by (9) as the update matrix, and distribute it via a secure channel to each participant. (ii) B2: each participant updates its shadow θ (t) i to θ (t+1) i by ( 10) and erases the variables θ (t) i and LM:…”
Section: Reversible Linear Cellular Automata With Memorymentioning
confidence: 99%
See 1 more Smart Citation
“…(i) B1: generate an k × k orthonormal matrix LM by (9) as the update matrix, and distribute it via a secure channel to each participant. (ii) B2: each participant updates its shadow θ (t) i to θ (t+1) i by ( 10) and erases the variables θ (t) i and LM:…”
Section: Reversible Linear Cellular Automata With Memorymentioning
confidence: 99%
“…Hence, the sharing and storing of these images can be more vulnerable towards several kinds of attacks, such as eavesdropping and tampering. Secret image sharing (SIS) [8,9] developing from the traditional secret sharing is a promising way to ensure the privacy and integrity of the secret image for distributed storing and sharing in the network. However, ordinary SIS will generate n shadows in the form of noise-like images [10,11] which might arise suspicious of the invaders [12] during the shadow dissemination.…”
Section: Introductionmentioning
confidence: 99%
“…However, the scheme itself would not solid and safe. In 2020, Chen et al [20] studied boolean-operation for MSIS and introduced a general access structure, but the general structures of other MSIS principles do not be proposed yet. Wang et al [21] proposed a polynomial-based scheme to share multiple secret images both within a group and between groups for access control, but the applications of the scheme was too limited.…”
Section: Introductionmentioning
confidence: 99%