+

Li et al., 2018 - Google Patents

A construction method of (t, k, n)-essential secret image sharing scheme

Li et al., 2018

Document ID
17848316939047440482
Author
Li P
Liu Z
Yang C
Publication year
Publication venue
Signal Processing: Image Communication

External Links

Snippet

Secret image sharing (SIS) is a technique to decompose a secret image into multiple shadows distributed to the corresponding participants. Only qualified subsets of the shadows can reveal the secret image. Usually all shadows have the same importance …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/38Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
    • G06F7/48Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
    • G06F7/52Multiplying; Dividing
    • G06F7/523Multiplying only
    • G06F7/533Reduction of the number of iteration steps or stages, e.g. using the Booth algorithm, log-sum, odd-even
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Similar Documents

Publication Publication Date Title
Li et al. A construction method of (t, k, n)-essential secret image sharing scheme
Ali et al. A new chaos based color image encryption algorithm using permutation substitution and Boolean operation
Anwar et al. A pixel permutation based image encryption technique using chaotic map
Li et al. Essential secret image sharing scheme with different importance of shadows
Shivani et al. Real-time cheating immune secret sharing for remote sensing images
Wong et al. An efficient diffusion approach for chaos-based image encryption
Elsheh et al. Secret sharing approaches for 3D object encryption
Deshmukh et al. Efficient and secure multi secret sharing schemes based on boolean XOR and arithmetic modulo
Eslami et al. Secret image sharing with authentication-chaining and dynamic embedding
Nag et al. An efficient Boolean based multi-secret image sharing scheme
CN105024803A (en) Behavioral fingerprint in a white-box implementation
Guo et al. A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem
Wang et al. Degradation and encryption for outsourced PNG images in cloud storage
US20210152326A1 (en) White-box encryption method for prevention of fault injection attack and apparatus therefor
Azza et al. Multi-secret image sharing based on elementary cellular automata with steganography
Liu et al. Reducing shadow size in smooth scalable secret image sharing
Praveen et al. Visual cryptographic schemes using combined Boolean operations
Elizabeth et al. HIDE: hyperchaotic image encryption using DNA computing
Deb et al. Enhancing image security via block cyclic construction and DNA based LFSR
Lan et al. A Novel Multi-Image Encryption Scheme Using Generalized Rectangular Transform and Advanced 5-D Hyperchaotic Map
Guo et al. A novel proactive secret image sharing scheme based on LISS
Annaby et al. On security of image ciphers based on logic circuits and chaotic permutations
Dong et al. Novel (n, n) secret image sharing scheme based on addition
Chang et al. A new probabilistic visual secret sharing scheme for color images
Yang et al. Constructions and Properties of General (k, n) Block‐Based Progressive Visual Cryptography
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载