The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2007
DOI: 10.1016/j.image.2006.12.012
|View full text |Cite
|
Sign up to set email alerts
|

Scalable secret image sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
73
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 104 publications
(80 citation statements)
references
References 15 publications
0
73
0
Order By: Relevance
“…After the preprocessing phase, each block is assigned a prime number, which is utilized to compute coefficients f 0 and f 1 for the polynomial function as follows: (10) where  …”
Section: The Sharing Phasementioning
confidence: 99%
See 2 more Smart Citations
“…After the preprocessing phase, each block is assigned a prime number, which is utilized to compute coefficients f 0 and f 1 for the polynomial function as follows: (10) where  …”
Section: The Sharing Phasementioning
confidence: 99%
“…If L = 1, the prime number is q 3 ; otherwise, the prime number is determined using the LSBs of two shadow pixels, such as (00), (01), or (10), to obtain prime numbers of q 0 , q 1 , or q 2 . This similarity allows users to recognize each shadow image without any computations, thereby providing a user-friendly interface for identifying shadow images with the naked eye.…”
Section: The Recovery Phasementioning
confidence: 99%
See 1 more Smart Citation
“…Blakley and Shamir [1,2] first conceptualized the idea of a (t, n) threshold secret sharing scheme, in which at least a minimum number t out of n participants are required in order to recover the secret. This scheme has been extended by various researchers [3][4][5][6][7][8][9][10][11][12][13][14][15][16] and successfully applied to activities such as protection of PDF files [12], visual cryptography [13,14], and network communication [15]. For digital media, many schemes for ensuring image sharing security have been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…The essential idea is to use a polynomial function of order k -1 to construct n image shares, in which the size of each share image is only 1/k times of the original image, but the computational complexity is the same as in Samir's scheme. This work attracted many researchers to propose different techniques which are given in references [4][5][6][7]. But in [3] T h i e n and L i n proposed a method in which the pixels having a value greater that 251, are truncated into 250.…”
Section: Introductionmentioning
confidence: 99%