2014
DOI: 10.2478/cait-2014-0023
|View full text |Cite
|
Sign up to set email alerts
|

Secret Image Sharing Scheme Based on a Boolean Operation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…Chen and Tsao developed an RG-based (2, n)-threshold VSS scheme [14] in the same year. Later, some researchers considered the use of XOR operations in their (k, n)-threshold VSS schemes [15,16]. In 2015, Ref.…”
Section: Introductionmentioning
confidence: 99%
“…Chen and Tsao developed an RG-based (2, n)-threshold VSS scheme [14] in the same year. Later, some researchers considered the use of XOR operations in their (k, n)-threshold VSS schemes [15,16]. In 2015, Ref.…”
Section: Introductionmentioning
confidence: 99%
“…Besides Shamir's scheme, some new techniques are introduced in SIS works. Nag et al 31 presented an SIS scheme based on a boolean operation which can achieve less recovery time compared with the existing schemes. Eslami et al 32 and AzzaA et al 33 realized SIS based on cellular automata.…”
Section: Related Workmentioning
confidence: 99%
“…Amitava Nag et al proficiently put forward a new (k, n) secret sharing scheme [7] with the help of Boolean operations. In this scheme, n-k shares are lost, secret image could be recovered using remaining k shares.…”
Section: Related Workmentioning
confidence: 99%