We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 6,471 results
  1. Full threshold change range of threshold changeable secret sharing

    A threshold changeable secret sharing (TCSS) scheme is designed for changing the initial threshold pair of the privacy threshold and reconstruction...

    Jian Ding, Changlu Lin, ... Huaxiong Wang in Designs, Codes and Cryptography
    Article 23 March 2023
  2. Changeable essential threshold secret image sharing scheme with verifiability using bloom filter

    In threshold secret image sharing schemes (k, n), the secret image S is distributed among n shareholders. To recover the secret image, at least k...

    Massoud Hadian Dehkordi, Samaneh Mashhadi, ... Mohommad Hosein Noorallahzadeh in Multimedia Tools and Applications
    Article 27 December 2023
  3. A (tn) threshold quantum image secret sharing scheme

    In this paper, a ( t n ) threshold quantum image secret sharing scheme based on combination theory is proposed. Here, the threshold t is a constant...

    Hua-Kun Wang, Guang-Bao Xu, ... Dong-Huan Jiang in Multimedia Tools and Applications
    Article 29 February 2024
  4. Boolean operation based lossless threshold secret image sharing

    Secret image sharing is a security technique which plays its role in multi-user environment. Secret image sharing using binary operation is a fast...

    Aakash Paul, Shyamalendu Kandar, Bibhas Chandra Dhara in Multimedia Tools and Applications
    Article 14 March 2022
  5. (kn) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability

    In the traditional secret image sharing (SIS) scheme, the secret image is divided into several noise-like shares, which lack authentication and may...

    Fei Hu, Weihai Li, Nenghai Yu in Multimedia Tools and Applications
    Article 10 October 2023
  6. A novel threshold changeable secret sharing scheme

    A ( t, n ) threshold secret sharing scheme is a fundamental tool in many security applications such as cloud computing and multiparty computing. In...

    Lein Harn, Chingfang Hsu, Zhe **a in Frontiers of Computer Science
    Article 08 October 2021
  7. On modular (CRT-based) secret sharing

    Secret sharing scheme (SSS) allows to share some secret s among n parties in such a way that only certain subsets of them can recover the secret. The...

    Article 01 July 2024
  8. A Lattice-Based Single-Share Secret Sharing Scheme

    In general, in a secret sharing scheme, the dealer chooses shares and distributes them to the participants securely. For the secure communication,...

    Ramakant Kumar, Sahadeo Padhye in SN Computer Science
    Article 21 October 2023
  9. Unconditionally secure non-malleable secret sharing and circular external difference families

    Various notions of non-malleable secret sharing schemes have been considered. In this paper, we review the existing work on non-malleable secret...

    Shannon Veitch, Douglas R. Stinson in Designs, Codes and Cryptography
    Article 16 November 2023
  10. ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism

    The traditional threshold secret sharing scheme only allows the participants’ sub-secret shares to be used once in the reconstruction process....

    Ruonan Shi, Yuling Chen, ... Tao Li in Journal of Cloud Computing
    Article Open access 05 August 2023
  11. Multi-party codebook distribution strategy based on secret sharing

    The paper addresses the issue of secure distribution of codebooks in the field of information security, particularly in the domain of covert...

    Wei She, Haige Feng, ... Wei Liu in International Journal of Information Security
    Article 02 July 2024
  12. FPGA acceleration of secret sharing for 3D data cubes

    Secret sharing can protect the security of important secret information in the network environment. However, the computational complexity and...

    Zi-Ming Wu, Tao Liu, ... Hong-Mei Yang in Journal of Real-Time Image Processing
    Article 10 July 2023
  13. A framework for counting based secret sharing scheme for images

    The existing secret sharing schemes used to protect sensitive multimedia data in distributed forms often compromise either security or computational...

    Bhawana Parihar, Maroti Deshmukh, Arjun Singh Rawat in Multimedia Tools and Applications
    Article 02 July 2024
  14. Preserving friendly stacking and weighted shadows in selective scalable secret image sharing

    With advancement of technology, the technique of selective scalable secret image sharing (SSSIS) was first proposed in 2017 as a new alternative of...

    Jung-San Lee, Yin-Chin Chen, ... Ngoc-Tu Huynh in Multimedia Tools and Applications
    Article 22 February 2023
  15. A GPU scheme for multi-secret visual sharing with varied secret dimensions and contrast enhancement using blind super-resolution

    Multi-secret visual sharing schemes are essential for secure and efficient sharing of sensitive visual information. However, existing schemes often...

    M. Raviraja Holla, D. Suma in International Journal of Information Technology
    Article Open access 19 January 2024
  16. Progressive secret image sharing based on Boolean operations and polynomial interpolations

    With the expansion of network bandwidth and the rise of social networks, image sharing on open networks has become a trend. The ensuing privacy...

    Hao Chen, Lizhi **ong, Ching-Nung Yang in Multimedia Systems
    Article 26 June 2024
  17. A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions

    Secret sharing schemes play a vital role in securely distributing a secret among multiple participants, ensuring confidentiality and access control....

    Bhawana Parihar, Arjun Singh Rawat, Maroti Deshmukh in The Journal of Supercomputing
    Article 30 April 2024
  18. Cheating identifiable polynomial based secret sharing scheme for audio and image

    Polynomial based secret sharing is the art of protecting information and a tool used in areas where a secret has to be distributed among multiple...

    Guttikonda Prashanti, Mundukur Nirupama Bhat in Multimedia Tools and Applications
    Article 17 May 2023
  19. Novel key-integration to safeguard counting-based secret-sharing from possibilities of cyberattack breaches

    In the face of malicious cyberattacks, classic security approaches like cryptography and steganography are becoming not sufficient. Secrecy are...

    Adnan Gutub, Faiza Al-Shaarani, Khoulood Alharthi in Multimedia Tools and Applications
    Article 19 April 2024
  20. Compressed sensing based visually secure multi-secret image encryption-sharing scheme

    The existing encryption schemes of visually secure image have drawbacks, such as excessive concentration of image data and insufficient resistance to...

    Bin Wu, Dong **e, ... Yangyang Zeng in Multimedia Tools and Applications
    Article 25 July 2023
Did you find what you were looking for? Share feedback.