2019
DOI: 10.1016/j.jisa.2019.05.010
|View full text |Cite
|
Sign up to set email alerts
|

Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…en, let the secret data S be a constant term of the polynomial. From the polynomial, n values can be calculated as n shares, where any k shares can recover S. Later, this idea was followed by many research scholars, such as these schemes [5,[28][29][30]. e approach in [5] proposes a SIS scheme based on Shamir's threshold secret sharing method.…”
Section: Preliminariesmentioning
confidence: 99%
“…en, let the secret data S be a constant term of the polynomial. From the polynomial, n values can be calculated as n shares, where any k shares can recover S. Later, this idea was followed by many research scholars, such as these schemes [5,[28][29][30]. e approach in [5] proposes a SIS scheme based on Shamir's threshold secret sharing method.…”
Section: Preliminariesmentioning
confidence: 99%
“…From the polynomial, n values can be calculated as n shares, where any k shares can recover s. Later, this idea was followed by many research scholars, such as these schemes. 19,[38][39][40] The approach in Reference 19 proposes a SIS scheme based on Shamir's threshold secret sharing method. The difference between References 19 and 27 is that Thien and Lin group image pixels, each group of pixels is used as polynomial coefficients (including constant term).…”
Section: Preliminariesmentioning
confidence: 99%
“…From the polynomial, n values can be calculated as n shares, where any k shares can recover s . Later, this idea was followed by many research scholars, such as these schemes 19,38‐40 . The approach in Reference 19 proposes a SIS scheme based on Shamir's threshold secret sharing method.…”
Section: Preliminariesmentioning
confidence: 99%