The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2020
DOI: 10.3390/app10113753
|View full text |Cite
|
Sign up to set email alerts
|

Secret Image Sharing Revisited: Forbidden Type, Support Type, and Their Two Approaches

Abstract: In this paper, we introduce two new image-sharing types to extend the applicability of sharing. Type 1 is our so-called forbidden type. In its sharing system, any t of the n shares can recover the secret image, unless the t shares form a forbidden group listed in a forbidden list. Type 2 is our so-called cross-department support type. If a government has 3 departments {DEPH, DEPM, DEPL}, then 3 thresholds (tH, tM and tL) exist. Any tH number of officers from department DEPH can unveil the secret image, and lik… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 19 publications
(65 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?