We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 6,286 results
  1. A Lattice-Based Single-Share Secret Sharing Scheme

    In general, in a secret sharing scheme, the dealer chooses shares and distributes them to the participants securely. For the secure communication,...

    Ramakant Kumar, Sahadeo Padhye in SN Computer Science
    Article 21 October 2023
  2. Natural share-based lightweight (nn) single secret image sharing scheme using LSB stuffing for medical images

    Natural share-based secret image sharing (SIS) scheme is an important security mechanism used to secure medical images such as X-rays, MRIs, and CT...

    Arjun Singh Rawat, Maroti Deshmukh, Maheep Singh in The Journal of Supercomputing
    Article 26 May 2023
  3. ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism

    The traditional threshold secret sharing scheme only allows the participants’ sub-secret shares to be used once in the reconstruction process....

    Ruonan Shi, Yuling Chen, ... Tao Li in Journal of Cloud Computing
    Article Open access 05 August 2023
  4. Changeable essential threshold secret image sharing scheme with verifiability using bloom filter

    In threshold secret image sharing schemes (k, n), the secret image S is distributed among n shareholders. To recover the secret image, at least k...

    Massoud Hadian Dehkordi, Samaneh Mashhadi, ... Mohommad Hosein Noorallahzadeh in Multimedia Tools and Applications
    Article 27 December 2023
  5. A verifiable multi-secret image sharing scheme based on DNA encryption

    A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes...

    Arup Kumar Chattopadhyay, Sanchita Saha, ... Jyoti Prakash Singh in Multimedia Tools and Applications
    Article 18 April 2024
  6. A GPU scheme for multi-secret visual sharing with varied secret dimensions and contrast enhancement using blind super-resolution

    Multi-secret visual sharing schemes are essential for secure and efficient sharing of sensitive visual information. However, existing schemes often...

    M. Raviraja Holla, D. Suma in International Journal of Information Technology
    Article Open access 19 January 2024
  7. Cheating identifiable polynomial based secret sharing scheme for audio and image

    Polynomial based secret sharing is the art of protecting information and a tool used in areas where a secret has to be distributed among multiple...

    Guttikonda Prashanti, Mundukur Nirupama Bhat in Multimedia Tools and Applications
    Article 17 May 2023
  8. A novel multi secret image sharing scheme for different dimension secrets

    The existing state of the art schemes deals with the same dimension secret images but less work is available in the literature for different...

    Arjun Singh Rawat, Maroti Deshmukh, Maheep Singh in Multimedia Tools and Applications
    Article 11 March 2023
  9. Enhanced block based progressive visual secret sharing scheme for grayscale and color image

    Block by block, the secret image will be retrieved from user-friendly and noise-like shares in the Block Based Progressive Secret Sharing (BPVSS)...

    Vishal V. Panchbhai, Suchita W. Varade in Multimedia Tools and Applications
    Article 07 November 2023
  10. Compressed sensing based visually secure multi-secret image encryption-sharing scheme

    The existing encryption schemes of visually secure image have drawbacks, such as excessive concentration of image data and insufficient resistance to...

    Bin Wu, Dong **e, ... Yangyang Zeng in Multimedia Tools and Applications
    Article 25 July 2023
  11. A fully dynamic multi-secret sharing scheme with redundant authorization

    Based on Shamir’s threshold scheme and Elliptic curve cryptography, a fully dynamic multi-secret sharing scheme with redundant authorization is...

    Fulin Li, Hang Hu, ... Jiayun Yan in Cryptography and Communications
    Article 08 November 2022
  12. Progressive secret image sharing based on Boolean operations and polynomial interpolations

    With the expansion of network bandwidth and the rise of social networks, image sharing on open networks has become a trend. The ensuing privacy...

    Hao Chen, Lizhi **ong, Ching-Nung Yang in Multimedia Systems
    Article 26 June 2024
  13. Improved resilience of secret sharing scheme with augmented multifarious features

    The requirement of greater flexibility and additional functionality in conventional secret sharing schemes is posed in many practical applications....

    Sonali Patil, Sheetal Bhandari, ... Shashikant V. Athawale in International Journal of Information Technology
    Article 14 May 2022
  14. Unconditionally secure non-malleable secret sharing and circular external difference families

    Various notions of non-malleable secret sharing schemes have been considered. In this paper, we review the existing work on non-malleable secret...

    Shannon Veitch, Douglas R. Stinson in Designs, Codes and Cryptography
    Article 16 November 2023
  15. Novel key-integration to safeguard counting-based secret-sharing from possibilities of cyberattack breaches

    In the face of malicious cyberattacks, classic security approaches like cryptography and steganography are becoming not sufficient. Secrecy are...

    Adnan Gutub, Faiza Al-Shaarani, Khoulood Alharthi in Multimedia Tools and Applications
    Article 19 April 2024
  16. A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions

    Secret sharing schemes play a vital role in securely distributing a secret among multiple participants, ensuring confidentiality and access control....

    Bhawana Parihar, Arjun Singh Rawat, Maroti Deshmukh in The Journal of Supercomputing
    Article 30 April 2024
  17. New attacks on secret sharing-based data outsourcing: toward a resistant scheme

    In this paper, two new practical attacks on some secret sharing-based data outsourcing schemes are first introduced, and several other security and...

    Peyman Rahmani, Seyed Mostafa Fakhrahmad, Mohammad Taheri in The Journal of Supercomputing
    Article 25 April 2022
  18. A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial

    In a ( t , n ) secret sharing scheme, cheating identification provides a very effective way to protect the security of the secret. In this paper, we...

    Fulin Li, Yang Liu, ... Shixin Zhu in Cryptography and Communications
    Article 31 March 2022
  19. Accelerating randomized image secret sharing with GPU: contrast enhancement and secure reconstruction using progressive and convolutional approaches

    Image Secret Sharing (ISS) is a cryptographic technique used to distribute secret images among multiple users. However, current Visual Secret Sharing...

    Raviraja Holla M, Suma D, Alwyn R. Pais in Multimedia Tools and Applications
    Article Open access 02 March 2024
  20. FPGA acceleration of secret sharing for 3D data cubes

    Secret sharing can protect the security of important secret information in the network environment. However, the computational complexity and...

    Zi-Ming Wu, Tao Liu, ... Hong-Mei Yang in Journal of Real-Time Image Processing
    Article 10 July 2023
Did you find what you were looking for? Share feedback.