Li et al., 2018 - Google Patents
A construction method of (t, k, n)-essential secret image sharing schemeLi et al., 2018
- Document ID
- 17848316939047440482
- Author
- Li P
- Liu Z
- Yang C
- Publication year
- Publication venue
- Signal Processing: Image Communication
External Links
Snippet
Secret image sharing (SIS) is a technique to decompose a secret image into multiple shadows distributed to the corresponding participants. Only qualified subsets of the shadows can reveal the secret image. Usually all shadows have the same importance …
- 238000010276 construction 0 title abstract description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/38—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
- G06F7/48—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
- G06F7/52—Multiplying; Dividing
- G06F7/523—Multiplying only
- G06F7/533—Reduction of the number of iteration steps or stages, e.g. using the Booth algorithm, log-sum, odd-even
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Li et al. | A construction method of (t, k, n)-essential secret image sharing scheme | |
| Ali et al. | A new chaos based color image encryption algorithm using permutation substitution and Boolean operation | |
| Anwar et al. | A pixel permutation based image encryption technique using chaotic map | |
| Li et al. | Essential secret image sharing scheme with different importance of shadows | |
| Shivani et al. | Real-time cheating immune secret sharing for remote sensing images | |
| Wong et al. | An efficient diffusion approach for chaos-based image encryption | |
| Elsheh et al. | Secret sharing approaches for 3D object encryption | |
| Deshmukh et al. | Efficient and secure multi secret sharing schemes based on boolean XOR and arithmetic modulo | |
| Eslami et al. | Secret image sharing with authentication-chaining and dynamic embedding | |
| Nag et al. | An efficient Boolean based multi-secret image sharing scheme | |
| CN105024803A (en) | Behavioral fingerprint in a white-box implementation | |
| Guo et al. | A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem | |
| Wang et al. | Degradation and encryption for outsourced PNG images in cloud storage | |
| US20210152326A1 (en) | White-box encryption method for prevention of fault injection attack and apparatus therefor | |
| Azza et al. | Multi-secret image sharing based on elementary cellular automata with steganography | |
| Liu et al. | Reducing shadow size in smooth scalable secret image sharing | |
| Praveen et al. | Visual cryptographic schemes using combined Boolean operations | |
| Elizabeth et al. | HIDE: hyperchaotic image encryption using DNA computing | |
| Deb et al. | Enhancing image security via block cyclic construction and DNA based LFSR | |
| Lan et al. | A Novel Multi-Image Encryption Scheme Using Generalized Rectangular Transform and Advanced 5-D Hyperchaotic Map | |
| Guo et al. | A novel proactive secret image sharing scheme based on LISS | |
| Annaby et al. | On security of image ciphers based on logic circuits and chaotic permutations | |
| Dong et al. | Novel (n, n) secret image sharing scheme based on addition | |
| Chang et al. | A new probabilistic visual secret sharing scheme for color images | |
| Yang et al. | Constructions and Properties of General (k, n) Block‐Based Progressive Visual Cryptography |